journal header

Volume 6, 2014

This Week's Online-Exclusive Feature

Seven Mistakes Being Made in SIEM and How to Fix Them
December 2014
Flint Brenton

Target’s security breach is a parable that continues to unfold daily, and it has drawn the interest of the IT community. From companies that process transactions to vendors that provide security solutions to the end customer wondering how to protect themselves from fraud, everyone can benefit when it comes to additional information with regard to security.

Providers of security software, also known as security information and event management (SIEM) solutions, believe that traditional solutions are indeed falling short. While there is no one-size-fits-all solution to securing every network, the following seven mistakes of current SIEM systems must be solved to effectively secure data in the modern enterprise.
Read More

Indicates Online-Exclusive Content

 

 

This Week's Featured Author Blog

Big Data Monetization, Security, Privacy and Trust
8 December 2014
Ulf T. Mattsson

Data are valuable. Businesses increasingly rely on data to make better decisions, to better target their customers and to predict the future. Leveraging data through real-time analysis for business value is driving businesses to collect more data faster and from more sources than ever. This has given rise to the era of big data and the Internet of Things.

These large caches of data also hold a significant direct value in monetization—the sale of part or all of the data to a third party. The percent of businesses monetizing their data is projected to triple by 2016. Much of this data is related to consumers—privacy data. Read More

Indicates Online-Exclusive Content