John Trobough of Business 2 Community recently wrote, “From narrowband to broadband, from kilobits to gigabits, from talking people to talking things, the volume of data in the world has reached epic proportions… and it’s only the beginning. Data is entering and leaving enterprises at unprecedented rates, and is often stored and accessed from a range of locations, such as from smartphones and tablets, virtual servers or the cloud. As the Internet has evolved, so has cybersecurity and the need for increased data analytics. Humans can no longer keep up with the data driven world, but machines can. By enabling semantic Web’s automated, continuous machine learning to create context out of interactions and data, security efforts will have continuous visibility and better control over digital assets. This future of machine learning is known as Cyber 3.0.” Read more
Posts Tagged ‘Cyber Security’
SUNNYVALE, CA–(Marketwired – Oct 9, 2013) - Narus, Inc., a leader in big data analytics for cybersecurity solutions, has been named a 2013 IT Excellence Award winner by TMC’s INTERNET TELEPHONY magazine for its nSystem product.
“Narus nSystem represents our company’s commitment to excellence in innovation, particularly as we develop patented solutions leveraging machine learning and big data analytics to proactively identify and thwart cyberthreats,” said John Trobough, president, Narus. Read more
LONDON– (Marketwire – Apr 23, 2013) - Silobreaker announced today at the Info Security Europe 2013 conference in London, the release of its mobile app for subscribers of Silobreaker Premium, the online intelligence tool for cyber security, competitive intelligence, incident management, risk analysis, and government/military OSINT.
With the app, subscribers get full access to their Silobreaker Premium setups, including features such as dashboards, watch lists and document collections. Read more
Threat Management is still a relatively new concept; there is no industry standard definition for it. In fact, the few people who are talking about it right now tend to view it from at least two very different perspectives – one a product focused approach to unifying perimeter security tools and two, a practice-focused management paradigm. As it evolves, Threat Management will eventually encompass both of those perspectives and will likely become perhaps the single most important element within any given Cyber Security solution.
In part 1 of the Cyber Security and Semantics series we discussed some of the highlights of how or where semantics may help transform the practice of Cyber Security. To understand the full implications of why Semantics and Semantic Technology is so crucial for Cyber Security we need to examine more of the problem space associated with.
There are still many folks out there wondering exactly how Semantic Technology can add value within mainstream solutions architectures and practices. This is something that I’ve spent the last three years working on, specifically developing a set of IT practices which leverages an underlying methodology that we’ve discussed here before called “Semantic Integration” (SI). SI can be applied to any functional or industry domain because what it really represents is the first philosophical breakthrough for enterprise integration in decades. Some people may feel that SOA represented a similar breakthrough, but in fact it hasn’t. The reason SOA has fallen short is because of continued misunderstanding as to where the application architecture began and the middleware and data architecture ended. Semantic Integration avoids this critical flaw by virtue of the fact that it supports every tier of the architecture and is relevant in both horizontal and vertical dimensions. One of the most exciting practices that we’ve built atop Semantic Integration is dedicated to improving Cyber Security through unification of the many IT security stovepipes.