Computerworld UK — Big data analytics tools will be crucial to enterprise security as criminals deploy faster and more sophisticated methods to steal valuable data, according to security firm RSA.
"We are really at the beginning of intelligence-driven security: it is just the tip of the iceberg. Looking forward we are going to have to be smarter [to deal with threats], and we are going to be looking at better data science," said RSA's head of knowledge delivery and business development, Daniel Cohen.
"It's not 'if' we are going to be breached, but 'when' we are going to be breached, so there is a need to focus more on detection. We saw with the Target breach it was the human factor that slipped there, so we have to be able to bring in more automation."
The number of successful attacks against high-profile businesses have clearly increased in recent years, with the compromise of Target's point of sale systems just one example of the variety of methods that cyber criminals are using to steal data on a large scale.
IBM moved today to take a bigger bite out of fraud by combining various pieces of software and services into a common framework that is simpler to deploy.
Rick Hoene, worldwide fraud solutions leader for IBM Global Services, says that while IBM has been delivering technologies to fight fraud for over 20 years, the scope of criminal fraud activity now requires a more integrated approach. To that end, IBM is launching a Smarter Counter Fraud initiative, which isbased on IBM Counter Fraud Management Software and existing assets. This combination creates a single offering that is simpler to both acquire and install.
Based on IBM’s Big Data analytics technologies, the IBM software is designed to aggregate data from external and internal sources and apply analytics in ways to prevent, identify and investigate suspicious activity. It includes analytics that identify non-obvious relationships between entities, visualization technology that identifies patterns of fraud, and machine-learning software to help prevent future occurrences of fraud based on previous discoveries.
While Hadoop may make Big Data more accessible, the setting up of a Hadoop cluster on commodity servers is not particularly simple.
To help IT organizations automate that process, Continuuity today announces it is contributing Loom, cluster management software that automates the process of provisioning a Hadoop cluster, to the open source community.
Continuuity CEO Jonathan Gray says it is a byproduct of the company’s effort to provide an application development environment for Hadoop that can be deployed on a private or public cloud. As customers began to build applications on the Continuuity platform-as-a-service (PaaS) environment, it became apparent they needed help with the DevOps elements of Hadoop.
Network World — Venture capital firms continue to funnel big sums of money to big data startups.
Most recently, Cloudera raised $160 million in new financing from investors including T. Rowe Price and Google Ventures. The latest round for Cloudera (which offers its own distribution of Hadoop plus integrated tools) brings its total funding to $300 million.
On the same day Cloudera announced its venture capital windfall, analytics startup Platfora announced funding of its own. Platfora, based in San Mateo, closed a $38 million round from investors including Tenaya Capital, Citi Ventures, Cisco and Allegis Capital. The latest round brings Platfora's total financing to $65 million.
Platfora's analytics and visualization software is designed to run on top of Hadoop; existing customers include DirecTV, Disney, and The Washington Post.
CIO — HR professionals and recruiters continue to rely on big data to refine the application and hiring process. They are tapping data analytics to predict ROI, performance and likely behavior. However, with so much valuable data available, it's easy to gloss over one of the most important parts of the recruiting process: the human element.
Focusing on "small data" can not only improve the speed and efficiency of your hiring process and pinpoint obstacles in your organization, it can make it easier to find passive talent candidates.
"It's been so exciting over the last few years to see the number of data collection and analysis tools growing, and I have no problem with using those tools," says Jason Berkowitz, vice president of client services at Seven Step Recruiting Process Outsourcing (RPO.)
Companies invest in enterprise risk management to identify, analyze, respond to and monitor risks and opportunities in their internal and external environments. These investments maximize opportunities, help avoid nasty surprises and provide reasonable assurance on the achievement of the organization’s objectives.
Established risk assessment processes can suffer from stale thinking in identifying and evaluating risks, especially risks that are ever-changing. Here are five ways to refresh your process, push thinking beyond the “known knowns” and improve the quality of thinking in your risk assessment process.
Business Continuity specialist Vocal has announced that it has been shortlisted for a BCI North America Award in the ‘Business Continuity Innovation of the Year’ category, after nominating its product ‘Command’ for the accolade.
“Command has spent many months in development, and years in its realisation, so this recognition is very important to us” says Vocal’s Trevor Wheatley-Perry. “It’s a truly unique and highly revolutionary solution, because it means that for the first time, any organisation, of any size, anywhere in the world can precisely replicate and manage its operations, systems, and processes during an incident.”
Built on Vocal’s award-winning iModus platform, Command is an easy-to-use tool which offers Vocal’s clients a comprehensive overview of their business continuity plans and fixed assets, a multi-faceted communications system to relay processes to people instantly, and a full audit of decisions made and actions taken during an incident. With hopes to implement the solution across a diverse range of new industries in 2014, the shortlist for the prestigious BCI Award has come at precisely the right time.
“The BCI North America Awards recognise the outstanding contributions of organisations and individual professionals working in the USA and Canada’s business continuity industry,” Trevor continues.
“It’s fantastic to have been shortlisted for such a prestigious award, and as all winners are automatically entered into the BCI Global Awards, being considered for this accolade might turn into some even more exciting opportunities in the future.”
The BCI North America Awards event will be held as part of the Disaster Recovery Journal Spring World Show 2014, a four-day industry gathering which begins on 30 March in Orlando, USA.
Vocal is recognised throughout the world as a trusted innovator of multi award-winning and proven business continuity and communication solutions. In 2007, Vocal launched iModus; the first fully integrated business continuity suite encompassing Notification, Planning, Mapping, Alerting, Staff Safety and Incident Management modules. A multi award-winning solution, iModus was selected as the emergency messaging system for incident management during the London 2012 Olympic and Paralympic Games.
On March 12th, 2014, Everbridge, the leader in Unified Critical Communications, acquired Vocal. The strategic acquisition further elevates Everbridge’s status as the world’s largest provider of emergency notification and critical communication solutions. With the addition of Vocal, Everbridge now offers the broadest product family in the industry, delivered through 12 distributed datacenters, and supported by employees in seven offices in North America, Europe, and Asia. The combined entity will serve more than 2,500 global clients who use the solution to communicate with over 50 million unique end-users every year.
COMMAND is all about actions; the ability to plan ahead and see what will actually happen, in any scenario, at any time. Built on the iModus platform, COMMAND has communications at its core; relaying processes according to the people who need to know, and manipulating data according to exacting operations and processes. We believe that COMMAND is the most exciting innovation the industry has seen in recent years, a new language that will transform the way incidents are managed across the world.
While it is highly innovative, COMMAND is beautiful in its apparent simplicity. It replicates a flow chart of any organisation’s process mapping systems, actions and priorities for varying scenarios are pre-set, one action at a time so that in even in the worst set of circumstances, an untrained member of staff could use the system to confidently and effectively respond to a business interruption.
COMMAND will eliminate the compromises involved in paper processes. It will allow any organisation to build a resilient framework, step-by-step and layer-by-layer according to its processes. The added incentive here is being able to test, measure and evaluate as part of the process, leaving no stone unturned.
Key Features of Command:
- Automatic Workflow at the touch of a button
- Bespoke Software
- Precision Management
- Double Edged: Joint role of director and recorder
NEW YORK, NY – DCProfessional Development (DCPro), the performance division of DatacenterDynamics that provides training courses and certification services, announced today its partnership with New York Institute of Technology (NYIT) for its sixteen-part Certificate of Mission Critical Infrastructure online learning course. The first-of-its-kind online foundation course is developed specifically for engineers looking to learn everything from basic concepts to highly focused facilities management methods under DCPro’s recognized industry educators.
The noncredit-bearing courses will be featured among NYIT’s Professional Development course offerings. Students who successfully fulfill course requirements and online examinations will earn a certificate of completion, “Foundations of Mission Critical Infrastructure,” from both DCProfessional and NYIT.
Peter Curtis, President/CEO of Power Management Concepts, LLC, professor at NYIT, author of the curriculum book Maintaining Mission Critical Systems in a 24/7 Environment , member of NYIT's school of engineering and computing sciences Dean's-Executive Advisory Board, and Advisory Board Member for DCProfessional Development says, “Training for mission critical facilities management, through the partnership of NYIT’s and DCPro’s online learning platform, will provide accessibility and enhanced certification for professionals in this field looking to develop their skills. The course is designed to bridge the gap between theory and real-world applications, with the same material used in many graduate programs throughout the country. Students who take this course enjoy the benefits of advanced education at a modest cost.”
DCProfessional’s courses are endorsed through numerous nationally and internationally recognized professional bodies, including the IEEE, the American Institute of Architects, NCEES, the BCS, Engineers Australia, BICSI and CITREP (full list available online ). Students in this course will gain knowledge in several mission critical disciplines ranging from Data Center Cooling Efficiency & Advanced Technology to Mission Critical Facilities Engineering.
“Online education and partnerships like this bring opportunities to students in a global data center market,” comments Jason Velody, Managing Director of DCProfessional Development. “Students gain the certification advantages from duly recognized and revered institutions.”
For more information on DCProfessional Development, visit http://www.dc-professional.com.
About DCProfessional Development
DCProfessional Development (a business division of DCD Group) delivers a diverse portfolio of accredited data center training and certification services to corporate and individual clients internationally. The management, instructors and advisors together form a team of some of the most recognized individuals in the industry. DCProfessional Development works closely with professional bodies and industry associations to ensure that our course materials and processes align with industry best practices and standards.
DatacenterDynamics, part of the DCD Group, is a premier full service B2B information provider, offering a comprehensive product and service portfolio tailored specifically for the data center industry through its divisions: Media, Events , Intelligence and Performance.
The Media Division features the world’s only global publication for the data center market, DatacenterDynamics FOCUS Magazine, along with multimedia offerings, webinars, and a renowned awards program recognizing innovation in the industry.
The Events Division incorporates DatacenterDynamics core event offering, the Converged conference series presently running in 48 locations around the globe, along with FOCUSOn and Intelligence Seminars.
The Intelligence Division offers an array of market research, business intelligence, analysis and reporting services; and The Performance division provides DCProfessionalDevelopment training courses and certification.
New York Institute of Technology (NYIT) offers 90 degree programs, including undergraduate, graduate, and professional degrees, in more than 50 fields of study, including architecture and design; arts and sciences; education; engineering and computing sciences; health professions; management; and osteopathic medicine. A non-profit independent, private institution of higher education, NYIT has 13,000 students attending campuses on Long Island and Manhattan, online, and at its global campuses. NYIT sponsors 11 NCAA Division II programs and one Division I team.
Led by President Edward Guiliano, NYIT is guided by its mission to provide career-oriented professional education, offer access to opportunity to all qualified students, and support applications-oriented research that benefits the larger world. To date, 95,000 graduates have received degrees from NYIT. For more information, visit nyit.edu.
CIO — The best practices and technologies involved with data loss prevention (DLP) on mobile devices aim to protect data that leaves the security of the corporate network. Data can be compromised or leaked for a variety of reasons: Device theft, accidental sharing by an authorized user or outright pilferage via malware or malicious apps.
The problems associated with mobile data loss have been compounded by the uptick in employees bringing their own devices to work, whether they have permission from IT or not. In a BYOD situation, the user owns the device, not the organization, and makes security somewhat trickier for IT to establish and maintain.
At a minimum, any mobile device that accesses or stores business information should be configured for user identification and strong authentication, should run current anti-malware software and must use virtual private networking (VPN) links to access the corporate network.