RSA's Art Coviello said Big Data will give practitioners the comprehensive picture they need to detect advanced threats.
The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.
As network security grows more elusive, CxOs need to ask their IT departments some tough questions.
EMC has acquired Menlo Park, Calif.-based online fraud detection provider Silver Tail Systems. Silver Tail, which offers "real-time web session and behavioral analysis" for banking, e-commerce and government customers, will operate as part of RSA, EMC's security division.
The challenge that Big Data presents is trying to align disparate analytical islands. The answer comes in pulling all the pieces together.
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
The BlueCross BlueShield settlement with the Office for Civil Rights is a reminder for health care organizations to bolster their data security, experts said.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
The ability by organizations to collect mountains of data offers a dream scenario for hackers, but if managed properly, large volumes of information also can present IT staff with unique and valuable insight into an organization's security posture.