Big Data Security...
Follow
Find
14.3K views | +3 today
Big Data Security Analytics
Covering Cyber Situational Awareness, Security Analytics, Visibility and Intelligence Sharing
Curated by cysap
Your new post is loading...
Your new post is loading...
Scooped by cysap
Scoop.it!

Bubble Links | Table of Contents

Bubble Links | Table of Contents | Big Data Security Analytics | Scoop.it
more...
cysap's comment, July 12, 2013 3:10 AM
For an overview and quick access. However, search can be made here in Scoop.it using 'Filter'
Scooped by cysap
Scoop.it!

Bank-Backed Security Utility Service to Serve All Industry Sectors

Soltra Edge is a free, standards-based communications network that connects public and private cyberthreat intelligence providers with enterprise security technology platforms that can put this information to use
more...
No comment yet.
Scooped by cysap
Scoop.it!

Step-by-Step Setup of ELK for NetFlow Analytics

Step-by-Step Setup of ELK for NetFlow Analytics | Big Data Security Analytics | Scoop.it
Contents   Intro Java Elasticsearch Logstash Kibana   Intro   The ELK stack is a set of analytics tools. Its initials
more...
No comment yet.
Scooped by cysap
Scoop.it!

An Introduction to Cyber Intelligence

An Introduction to Cyber Intelligence | Big Data Security Analytics | Scoop.it
This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer at Utica College, I teach graduate students in the M.S.
more...
No comment yet.
Scooped by cysap
Scoop.it!

Securing the future: Using predictive analytics to seek out hidden threats

Securing the future: Using predictive analytics to seek out hidden threats | Big Data Security Analytics | Scoop.it
The only thing that you can be certain of in life is, that nothing is certain. For thousands of years the human race has tried to prove otherwise.
more...
No comment yet.
Scooped by cysap
Scoop.it!

Elasticsearch, Fluentd, and Kibana: Open Source Log Search and Visualization | DigitalOcean

Elasticsearch, Fluentd, and Kibana: Open Source Log Search and Visualization | DigitalOcean | Big Data Security Analytics | Scoop.it
This tutorial shows you how to build a log solution using three open source software components: [Elasticsearch](http://www.elasticsearch.org), [Fluentd](https://www.fluentd.org) and [Kibana](http://www.kibana.org).
more...
No comment yet.
Scooped by cysap
Scoop.it!

Kibana 4 Beta 2: Get It Now

Kibana 4 Beta 2: Get It Now | Big Data Security Analytics | Scoop.it
Eeeeeeeee! It’s here! Kibana 4 Beta 2 is ready to be poked, prodded, and otherwise fiddled with by you, your friends, and your exceptionally intelligent pets. We look forward to your feedback. If you just can’t wait to get started, grab Kibana 4 Beta 2 here, otherwise read on for the good stuff. Along with [...]
more...
No comment yet.
Scooped by cysap
Scoop.it!

What Security Analytics Can Tell You

Analysis of data inside and outside of a healthcare facility can help identify when a breach is occurring and enable the organization to take proper mitigating actions, says Ken Bradberry, chief technology officer at Xerox Commercial Healthcare.
more...
No comment yet.
Scooped by cysap
Scoop.it!

'One Bank's Incident Becomes Everyone's Defense' -

Banks will share cyber-attack incident information with each other through a new piece of software called Soltra Edge.
more...
No comment yet.
Scooped by cysap
Scoop.it!

IBM 'Pivots' Security Portfolio to the Cloud

IBM has built an 'intelligent security portfolio' intended to protect data and applications in the cloud. Designed to be used with different users, whether it be a developer or line-of-business executive, the portfolio also includes analytics and security intelligence for public cloud services such as IBM's SoftLayer. In addition, the offering features IBM's Managed Security Services platform, which can help secure the cloud for IBM clients as well as clients of companies like Amazon Web Services and Salesforce.com.
more...
No comment yet.
Scooped by cysap
Scoop.it!

US firm Alert Logic looking to grow rapidly in Cardiff

US firm Alert Logic looking to grow rapidly in Cardiff | Big Data Security Analytics | Scoop.it
Alert Logic's security operations centre in Cardiff will provide a valuable perspective on global threat activity and dramatically increase the security of organisations
more...
No comment yet.
Scooped by cysap
Scoop.it!

Why PCI Will Issue Log Monitoring Guidance

Why PCI Will Issue Log Monitoring Guidance | Big Data Security Analytics | Scoop.it
Troy Leach of the PCI Security Standards Council says log monitoring is an effective data breach detection tool that, unfortunately, not enough merchants put to
more...
No comment yet.
Scooped by cysap
Scoop.it!

Big Data: Cyber Security's Silver Bullet? Intel Makes the Case

Cyber security has been a losing game of whac-a-mole for years as the malefactors manage to pop out of new security holes faster than IT and their software suppliers can plug the last batch. The game has also been a costly one for businesses and end users, which have collectively [...]
more...
No comment yet.
Scooped by cysap
Scoop.it!

Threat intelligence-sharing platform now available

Free software offers cyber attack security Soltra, an FS-ISAC and DTCC joint venture created to help secure critical infrastructure entities from cybe...
more...
No comment yet.
Scooped by cysap
Scoop.it!

Avoiding Data Breaches with Context Aware Behavioral Analytics

Avivah Litan of Gartner explains how context aware behavioral analytics may have prevented recent retail breaches and the Snowden, NSA surveillance saga.
more...
No comment yet.
Scooped by cysap
Scoop.it!

How Big Data Analytics Is Shining a Light on Anonymous Web Traffic

How Big Data Analytics Is Shining a Light on Anonymous Web Traffic | Big Data Security Analytics | Scoop.it
They arrive suddenly at your website with no identification or cookies, browse product for minutes or hours on end, and then leave abruptly without a word.
more...
No comment yet.
Scooped by cysap
Scoop.it!

FFIEC: Financial Institutions Need to Share Cyberthreat Information

Why it matters: Financial institutions of all sizes need to share cyberthreat information with each other, the Federal Financial Institutions Examination Council (FFIEC) urged based...
more...
No comment yet.
Scooped by cysap
Scoop.it!

Cisco hands over security analytics framework to open source development

Cisco hands over security analytics framework to open source development | Big Data Security Analytics | Scoop.it
The tech giant is making the OpenSOC security and data analytics framework available through open source.
more...
No comment yet.
Scooped by cysap
Scoop.it!

Security Analysts Discuss SIEM's - ElasticSearch/Logstash/Kibana vs ArcSight, Splunk, and more

  Hello! The conversation below took place between multiple analyst who work in different security operation centers at multiple different companies. Their names and affiliations in the actual...
more...
No comment yet.
Scooped by cysap
Scoop.it!

Sr. Manager, Information Security Risk Reporting & Analytics job - Charles Schwab - Denver, CO

November 12, 2014 - Sr. Manager, Information Security Risk Reporting & Analytics job - **We believe that**, when done right, investing liberates people to create their own destiny. **We are...
more...
No comment yet.
Scooped by cysap
Scoop.it!

Better Together: Why Cyber Security Vendors Are Teaming Up

Alliances, mergers, and acquisitions are ushering in an era of unprecedented co-opetition among former rivals for your point solution business.
more...
No comment yet.
Scooped by cysap
Scoop.it!

Masergy Live Webinar to Discuss How to Transform Enterprise Security with Advanced Analytics

Company Joined by Analyst Firm to Review Latest Methods for Early Detection of Sophisticated Network Attacks

more...
No comment yet.
Scooped by cysap
Scoop.it!

Sharing threat information before, during, and after a cyber-attack

Sharing threat information before, during, and after a cyber-attack | Big Data Security Analytics | Scoop.it
Time is not your friend when your information systems are under cyber attack, but sharing threat information before, during, and after an attack with a trusted group of peers can help. Not only does it alert the other members of your community to a potential attack, it can provide critical actionable ...
more...
No comment yet.
Scooped by cysap
Scoop.it!

Logentries announces the first unlimited, on-demand log management and analytics service - SD Times

Logentries announces the first unlimited, on-demand log management and analytics service - SD Times | Big Data Security Analytics | Scoop.it
New cloud-based log management and analytics service breaks the traditional “pay for everything” log management model
more...
No comment yet.
Scooped by cysap
Scoop.it!

Discovering Patterns for Cyber Defense Using Linked Data Analysis

Discovering Patterns for Cyber Defense Using Linked Data Analysis | Big Data Security Analytics | Scoop.it

Click here to edit the title

more...
No comment yet.
Scooped by cysap
Scoop.it!

Prelert Aiming To Make Its Mark In Advanced Security Analytics

Prelert sells its Anomaly Detection advanced security analytics engine to examine logs from a variety of sources and uncover serious threats for incident responders. Interest in big data security analytics is increasing. Page: 1
more...
No comment yet.