Research report

Research report News

View All News

Research report Get Started

Bring yourself up to speed with our introductory content

  • Strategies, tactics and tools for making big data applications count

    Big data management and analytics initiatives can give organizations a wealth of insight into their internal operations, market trends, customer behavior and other business factors. But it isn’t easy to plan, implement and manage big data applications involving a variety of data and technologies such as Hadoop clusters and NoSQL databases. If companies aren’t careful, their big data investments could go for naught.

    This e-book provides advice on making key aspects of the process work, as well as real-world examples of big data projects in various industries. The first chapter focuses on combining stream processing and big data technologies to support real-time analytics capabilities that can drive faster and more informed decision making. The second offers guidance on managing big data analytics efforts without stifling the work of the data scientists and other analysts who are trying to uncover valuable business information. And the third examines the opportunities for visualizing big data analytics findings to help business users better understand them—and the challenges that analytics teams face in doing so effectively. Continue Reading

  • Threat intelligence and risk: Why cybersecurity hangs in the balance

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above and beyond compliance requirements. Global threat intelligence services have continued to evolve and play more of role in security information and event management and endpoint security products. More organizations are collecting and analyzing global threat information against vulnerabilities in their IT infrastructure and other assets. We evaluate the value of these services in risk assessment and find out how to take advantage of endpoint intelligence. We also report on the growing trend of community-based threat intelligence services, and look at the puppet masters of malware, command-and-control networks. Columnist Marcus Ranum interviews Avi Rubin about his latest work on shielding medical information systems. Continue Reading

  • Figuring out FIDO as the first products emerge

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed in April. As industry players such as Google, Microsoft and RSA work on stronger authentication methods that strive to keep personally identifiable information on the client, how will the evolution of two-factor authentication affect enterprise technologies? We look at the security implications of the open FIDO specifications and a range of emerging FIDO-ready technologies that can help security professionals track key developments as adoption of password-free authentication moves a step closer.

    We also report on the evolving roles of CISOs after the Target breach, and renewed calls for federal legislation on data collection and breach notification. Columnist Marcus Ranum interviews Georgia Weidman about pen testing and network compromise. Continue Reading

View All Get Started

Evaluate Research report Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Research report

Learn to apply best practices and optimize your operations.

  • Are SIEM products delivering on advanced analytics?

    Faced with a deluge of security and log information, enterprises are overwhelmed by different types of data and finding it harder to respond to potential security events. Interest in security information and event management (SIEM) is increasing as companies look to detect breaches earlier and limit damage, but information overload -- false positives -- and missed signs of advanced attacks continue to be major problems. Big data technologies and advanced analytics have promised to deliver better and more complete threat detection. Should these systems be combined with SIEM products, or is it time to move on? In our cover story, we report on realistic expectations with SIEM products and data analytics today, and what actions companies may want to consider going forward.

    As some enterprises look to advanced analytics for help, we revisit the concept of "good enough" security in the wake of the Sony Pictures Entertainment hacking scandal. CISOs, chief technology officers, and IT security and risk managers weigh in: Will security management have greater influence on business risk decisions in light of the security implications going forward? We report our findings. Finally, we have all heard about the benefits of vulnerability rewards programs, but what about the risks? Organizations outside of the technology industry may not be convinced about the rewards of bug bounty programs. We explore both sides of the issue.

     Continue Reading

  • Tips on building big data, advanced analytics programs

    TDWI analyst Fern Halper offers up expert advice for organizations looking to go beyond basic intelligence practices. Continue Reading

  • In denial about DDoS: Defense planning falls short

    Advanced distributed denial-of-service attackers are using a mix of techniques to hit targeted victims in ways all too similar to advanced persistent threats. DDoS defense planning is still lax at many enterprises, but if you do not have mitigation processes in place, it will cost you. Response, brand reputation and opportunity costs quickly add up in major attacks. The primary cost for victims, tied to the length of the outage, is revenue interruption says John Pescatore, director of emerging trends at the SANS Institute. The former Gartner analyst looks at the current denial-of-service landscape and associated costs in his article, “DDoS defense planning falls short.” Adam Rice and James Ringold continue their series on APTs. In their article “Man versus machine data,” the authors outline strategies to implement verbose logging across the enterprise and discuss the promise of big data security analytics to help security professionals track the APT lifecycle. The hard issues around intellectual property protection and the steps enterprises and vendors are taking to address them are also covered this month in Feature Editor Kathleen Richards’ article, “Breaches reignite intellectual property protection.” We also welcome back longtime columnist Marcus Ranum, who starts off the year chatting about metrics with IBM’s Diana Kelley. Security 7 winner Frederick P. Chang, Ph.D., offers his take on what is needed to take cybersecurity education and science to the next level. Continue Reading

View All Manage

Problem Solve Research report Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close