{"id":68698,"date":"2014-08-26T16:48:28","date_gmt":"2014-08-26T20:48:28","guid":{"rendered":"http:\/\/www.eugenesis.com\/platform-for-advanced-behavioral-threat-detection-using-big-data-is-subject-of-issa-journal-paper-by-interset-cto\/"},"modified":"2014-08-26T16:48:28","modified_gmt":"2014-08-26T20:48:28","slug":"platform-for-advanced-behavioral-threat-detection-using-big-data-is-subject-of-issa-journal-paper-by-interset-cto","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/platform-for-advanced-behavioral-threat-detection-using-big-data-is-subject-of-issa-journal-paper-by-interset-cto.php","title":{"rendered":"Platform for Advanced Behavioral Threat Detection Using Big Data Is Subject of ISSA Journal Paper by Interset CTO &#8230;"},"content":{"rendered":"<p><p>    Ottawa, ON (PRWEB) August 26, 2014  <\/p>\n<p>    The author of a new paper in the August 2014 issue of the    Information Systems Security Association (ISSA) Journal says    big data is providing greater context than ever before and    helping to feed new security software platforms which are more    effective at monitoring users and machines to detect behavioral    anomalies that are the precursors of insider and targeted    outside attacks. Stephan Jou, CTO of Interset, has authored \"Towards a Big Data    Behavioral Analytics Platform,\" <a href=\"https:\/\/www.interset.com\/media\/Big-Data-Behavioral-Analytics_ISSA0814-1.pdf\" rel=\"nofollow\">https:\/\/www.interset.com\/media\/Big-Data-Behavioral-Analytics_ISSA0814-1.pdf<\/a>,    exploring how the application of data science and increasingly    powerful analytics on a growing volume of big data are able to    correlate, quantify and corroborate behavioral events to    effectively detect threats and attacks, while removing white    noise and false positives.  <\/p>\n<p>    Big data in the context    of security refers to the increasing velocity, volume and    variety of data from sources that may include network, email,    endpoints and log data from a wide range of repositories that    contain intellectual property as well as non-traditional data    sources, such as social media, HR performance and financial    credit ratings. The August ISSA Journal, \"Big Data: Use and    Security Ramifications,\" covers the challenges and solutions    for securing big data projects and is available at: <a href=\"https:\/\/www.issa.org\/?page=ISSAJournal\" rel=\"nofollow\">https:\/\/www.issa.org\/?page=ISSAJournal<\/a>.  <\/p>\n<p>    Interset, the new name for FileTrek Inc., delivers    behavioral-centric security, specializing in helping    organizations in industries such as manufacturing, life    sciences, and government to protect sensitive data. This    includes intellectual property, trade secrets and classified    files which may be at risk from insider or targeted outside    attack. Interset's highly intelligent and accurate enterprise    threat detection solution enables companies of all sizes to use    the power of big data, behavioral analytics and machine learning to    protect their sensitive data.  <\/p>\n<p>    \"The Information Security segment is ripe for, and in a very    real sense, demands, big data analytics,\" says Interset's Jou.    \"But amassing a comprehensive and large data plane is only half    the battle. We also need to apply principled mathematics to    help us turn the data into actionable insights. By building    probabilistic models that quantify how bad, suspicious or    abnormal an event is, we can keep all events and their    associated scores for correlation,\" he says. \"This allows us to    more accurately assess the overall risk posture of any entity    inside our system, and even detects 'low and slow' threats by    no longer ignoring low probability events that, with a    threshold-based approach, would otherwise be discarded.\"  <\/p>\n<p>    The ISSA is a not-for-profit, international professional    organization of information security professionals and    practitioners. It provides educational forums, publications and    peer interaction opportunities that enhance the knowledge,    skill and professional growth of its members.  <\/p>\n<p>    About Interset    Interset (formerly FileTrek) provides a highly intelligent and    accurate insider and targeted outsider threat detection    solution that unlocks the power of behavioral analytics,    machine learning and big data to provide the fastest, most    flexible and affordable way for IT teams of all sizes to    operationalize a data protection program. Utilizing agentless    data collectors, lightweight endpoint sensors, advanced    behavioral analytics and an intuitive user interface, Interset    provides unparalleled visibility over sensitive data, enabling    early attack detection and actionable forensic intelligence    without false positives or white noise. Interset solutions are    deployed to protect critical data across the manufacturing,    life sciences, hi-tech, finance, government, aerospace &    defense and securities brokerage industries. For more    information, visit <a href=\"https:\/\/www.interset.com\" rel=\"nofollow\">https:\/\/www.interset.com<\/a> or follow us on twitter    @intersetca.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.prweb.com\/releases\/2014\/08\/prweb12115474.htm\/RK=0\/RS=OC49n0BSyR1hXokFnMOFk7IIOPU-\" title=\"Platform for Advanced Behavioral Threat Detection Using Big Data Is Subject of ISSA Journal Paper by Interset CTO ...\">Platform for Advanced Behavioral Threat Detection Using Big Data Is Subject of ISSA Journal Paper by Interset CTO ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Ottawa, ON (PRWEB) August 26, 2014 The author of a new paper in the August 2014 issue of the Information Systems Security Association (ISSA) Journal says big data is providing greater context than ever before and helping to feed new security software platforms which are more effective at monitoring users and machines to detect behavioral anomalies that are the precursors of insider and targeted outside attacks.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/behavioral-science\/platform-for-advanced-behavioral-threat-detection-using-big-data-is-subject-of-issa-journal-paper-by-interset-cto.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":57,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[577410],"tags":[],"class_list":["post-68698","post","type-post","status-publish","format-standard","hentry","category-behavioral-science"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/68698"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/57"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=68698"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/68698\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=68698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=68698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=68698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}