Modeling The Storm of Cybersecurity Data

Modeling The Storm of Cybersecurity Data

Consider the job of the weather person. It used to be that a weather forecast was almost unusable because of low accuracy. But now, it is commonplace to put a reasonable amount of faith in the forecast. Really, not that long ago, we used an almanac to get a sense of the weather. My, how things have improved!

I actually rely on the forecast I access on my smartphone. Why is the prediction so much better today than it was in the past?

Read More »

Are You Fighting the Cyber Battle or the Overall War?

Are You Fighting the Cyber Battle or the Overall War?

From Mental Models to Computational Models

It used to be that a diligent team of analysts with some programming skills could do a respectable job of protecting an enterprise on their own. They knew enough of the specific threats, the specifics of the enterprise, and the specifics of the enterprise network, that they could monitor for problems and mitigate those problems. Unfortunately, the volume and voracity of the threats has grown. The variety of business models has expanded. The complexity of enterprise network topologies has increased. These factors mandate that cybersecurity solutions evolve. Cybersecurity teams must upgrade to a better strategy.

No longer are one-off scripts and the programming of lookup tables adequate to face the criminal elements. The risks and liabilities are just too high.

Read More »

Subscribe to Email Updates

Subscribe via RSS to the blog

Recent Posts