article thumbnail

Busted for book club? Why cops want to see what you’re reading, with Sarah Lamdan (Lock and Code S05E14)

Malwarebytes

Those “tangible things,” the law said, included “books, records, papers, documents, and other items.” What’s changed, however, is that companies that libraries have relied on for published materials and collections—Thomson Reuters, Reed Elsevier, Lexis Nexis—have reimagined themselves as big data companies.

article thumbnail

The Data Lakehouse Post 1 – My Database Wishlist – A Rant

Security Boulevard

In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In 2015, I wrote a book about it. And advances in both big data analysis and artificial intelligence will make tomorrow's applications far creepier than today's. This is why all your personal information is collected, and this is why it is so valuable. Companies that can understand it can use it against you. None of this is new.

article thumbnail

How to SLO Your SOC Right? More SRE Wisdom for Your SOC!

Anton on Security

all quotes are from the SRE book here) So? Read the SLO chapter in the book for a full example, but they have an example of a service where the reliability was too high. The SRE book reminds us that “good metrics” may need to be balanced with other metrics, rather than blindly pushed up. OK, what’s an SLI? How is it bad?

Phishing 189
article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

A few key takeaways: Sticks & carrots Poor security practices at British Airways resulted in hackers pilfering credit card information, names, addresses, travel booking details and logins for some 500,000 airline customers. For a full drill down on our meeting, give a listen to the accompanying podcast.

Big data 153
article thumbnail

How the new Spirion-Thales partnership enables sensitive-data-centric encryption

Thales Cloud Protection & Licensing

How the new Spirion-Thales partnership enables sensitive-data-centric encryption. Getting everything booked was surprisingly uneventful; that is, until I tried to reserve a kennel for my two dogs. Everything is booked solid or outrageously expensive. Transparent Data Protection. Thu, 06/30/2022 - 05:43.