Remove Cyber Attacks Remove Data collection Remove InfoSec
article thumbnail

Learning from Near Misses

Adam Shostack

Second, last year marked 25 years of calls for an "NTSB for infosec." In recent years, we have seen explosive growth in the number of damaging cyber-attacks. Mandatory reporting and investigations would result better data collection. Unfortunately, we're still not learning as much as we could.

InfoSec 130
article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

The data collected from various sources is then analyzed using various tools. Main features of SDL There are five key features that SDL should have: The key component of SDL is the automation of data collection and parsing. Viewing this data manually is unrealistic. Automation of adding context for security logs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

But technological advancement inherently results in greater cyber risk, and today’s OT systems are more vulnerable than ever. . As threat actors continue to target critical infrastructure and industrial assets, we have seen ICS cyber-attacks increase in frequency and sophistication.

article thumbnail

Cyber CEO: Data Privacy Day – How to Enhance Your Data Privacy

Herjavec Group

Data Privacy Week aims to create awareness about online privacy, educate citizens on how to manage and secure their personal information, and support businesses in respecting data and being more transparent about how they collect and use customer data. Assess Your Security Strategy on a Regular Basis.