Search:

Category: Market Data

  • Palantir

    Palantir’s Struggles and Big Data’s Evolution in Information Security

    The media has documented some recent struggles by Palantir in retaining customers and staff. Included in this coverage is an assertion in a BuzzFeed article that: “Toward the end of last year, Palantir killed its effort to create an elite cybersecurity group, after executives decided it wasn’t gaining enough traction… In April 2015, employees were informed that American Express had dumped Palantir after 18 months of cybersecurity work… At its peak last year, two of the sources said, the cybersecurity team included more than 10 forward deployed engineers; the majority…

    READ MORE
  • 2-jpeg

    50% of Information Security Professionals Lack Confidence in Their Security Solutions – no surprise there

    Barkly recently released a survey of 350 IT professionals to gauge their confidence in the existing information security infrastructure. One key finding is that 50% have confidence in their current security posture. According to Barkly researchers, that means 50% are not confident. A Dark Reading article reported that Barkly co-founder and CTO Jack Danahy “found it startling that such a large number of respondents in the survey don’t trust their security solutions. ‘Around half of the people we talked to don’t have confidence in the choices that they’ve already made,’…

    READ MORE
  • Screen-Shot-2016-01-24-at-10.13.53-AM

    Things Have Changed in Cybersecurity – the Political Front

    On January 12th, Jeb Bush published an article in Business Insider titled “Here’s my plan to address the monumental threat of cyber attacks.” Put aside your partisan hat for a moment. This is the first time I can recall a prominent presidential candidate making information security such a prominent part of a campaign’s policy focus. I am sure Bush supporters will point out that this is not quite new. He posted short articles on cybersecurity in Medium back in June and September. However, the recent moves by his campaign to…

    READ MORE
  • office-space-boss_36733 copy

    Why the CISO Should Be A Peer, Not an Underling

    To Get Really Secure, First Empower Your Leadership: Why the CISO Should Be A Peer, Not an Underling Each time there’s a major security breach, organizations at all levels reevaluate their cyber security procedures and teams. In fact, 47 percent of C-suite executives  hold CISOs accountable for a breach. Some companies choose to use the CISO as a scapegoat but don’t address what it will really take to shore up their enterprise security – all too often this includes empowering the CISO within the C-suite. There’s significant value in having the CISO considered equal to…

    READ MORE
  • matrix1 copy

    CISO’s Top Concerns for 2015

    Almost a year has passed since Target experienced a massive data breach yet the company is still feeling pain over the problem: S&P cut Target’s credit rating this fall, projecting a negative impact on sales well into 2015. Other companies dealing with data breaches are seeing the same long-term damage — under-emphasizing the importance of preventing information security problems before they happen is impossible. For 2015, there are three concerns that any chief information security officer should be considering. Open Source Dependencies Require More Attention Heartbleed and Shellshock demonstrated the…

    READ MORE
  • panel copy

    Open Analytics Cyber Summit Recap

    IKANOW hosted another hugely successful Open Analytics Summit, this time with a focus on cyber security. This was our 5th summit in our 3rd city. The day started off with our very own Chris Morgan, talking about the importance of cyber security in both the public and private sectors and how it’s becoming more and more of a boardroom topic of discussion. We then kicked off the talks with an outstanding panel discussion moderated by Hank Brown with CAI with panelists from Cyber Command, Air Force, Secret Service, DHS, and…

    READ MORE
  • threat_intel copy

    Threat Intelligence Analytics: Why CISOs are Investing in it

    As Security Becomes a Boardroom Topic, CISOs Are Seeking Threat Intelligence Analytics Tools to See the Big Picture Required to Prioritize Risks and Align with Business Goals. Is all press good press? Not when it looks like this: Cyber security is a hot (very hot) topic because when successful attacks happen, the news hits front pages with speed and force—and it’s seldom pretty. Attacks don’t just cause bad press, they can cause massive amounts of fraud, loss of profits, and much more. The Home Depot data breach is expected to…

    READ MORE
  • 4-Vs-of-big-data-500x500

    Value, the most important “V” of Big Data

    Today, commercial organizations and Government agencies are facing a multitude of complex issues when it comes to managing and analyzing data. According to IBM, 90% of the data in the world today was created in the last 2 years. It’s been cited by multiple sources that of that 90%, about 80%-90% is unstructured data with about 2.5 quintillion bytes (2.3 trillion gigabytes) of data is created each day. The variety and velocity of data can also seem overwhelming. From 340M+ tweets per day and 2M searches per minute at Google,…

    READ MORE
  • Screenshot-2014-01-24-10.30.33-500x500

    8 Proven Steps to Starting a Big Data Analytics Project

    Initiating a big data analytics solution can vary in time from as little as a few week to a multi-year effort. This is dependent on many factors: your true understanding of your requirements, your perceived information technology (IT) hurdles or,  your access to the data the you require, the complexity of the analytics, and many, many more. So while each big data organizations may have differing opinions on how long it actually takes to start and implement a solution, it doesn’t mean that one is right and others are wrong….

    READ MORE
  • photo-2-5-500x500

    Where can I get the best free data for new analysis projects?

    Data analysis tools were all the rage in 2013, so it’s no surprise that many people want to integrate some form of data-driven analytic solution into their business. To implement a data solution you want to include your own proprietary data but it’s often necessary to combine your data with something else to find some insights. Analysis projects usually start off with an untested ideas, so it’s always a good idea to try to keep costs down by looking for free data sets to combine with your proprietary data. Finding…

    READ MORE