Two weeks in a row of less than savory Apple news? First it was the Mac Trojan, now it’s an antitrust lawsuit over e-books. Never fear, friends of Steve; top Silicon Valley attorney Gary Reback opines on why this won’t take the shine off Apple, and what the case means for the tech industry as a whole.
Identity crisis, part one: Yahoo scrambles to search for its place among Web users. First step? Cutting 2,000 jobs.
Identity crisis part two: Sony confirms it will put 10,000 jobs on the chopping block around its One Sony reorganization plan. Anyone see a pattern?
Tired of hearing the future of the CIO role called into question? So is blogger Andi Mann, who this week offers up Survivor: CIO Edition.
And speaking of the ever-shifting CIO role, Bank of America replaced its IT chief with a consumer bank executive. Our own Senior Writer Linda Tucci has an interesting take on the BofA shuffle.
For when bad things happen to good data, here are tips on finding the right words to respond to a security breach.
In this economy it’s difficult to start a sentence with “You couldn’t pay me enough to…” but this IT job at the Olympics probably gets close. Sweet dreams.]]>
Big data can help an information security strategy, he said. Really? From what I’ve been hearing from CIOs and chief information security officers, big data — information coming in and out of an organization from all over — is a security threat. I had never heard about big data improving information security strategies.
Crawford enlightened me by explaining that data-driven security — or using technologies like data mining, data analytics and quantitative statistics — is a great way to spot security threats and trends.
“Analyzing big data can give you quicker insights into large volumes of data and security problems, and you can use real-time event alerting,” he said.
In a recent blog post, Crawford explains:
“The data explosion is just as real in security as elsewhere. And just as with other aspects of the intelligence-driven enterprise, big data offers new challenges — and new opportunities. Much more information is available than ever before that can help enterprises identify previously unrecognized threats, sharpen their defenses and acquire the awareness needed to develop more effective risk management programs. Today, techniques are emerging for harnessing this data to improve countermeasures and expand strategic insight.”
Crawford explains his theory in great depth in a five-part series on the rise of data-driven security.
As for the original security topic? Remote access security policies in a BYOD era? Data-loss prevention tools are not a silver bullet, he said. But that’s a topic for another time.
Let us know what you think about this blog post; email: Christina Torode, News Director]]>