Information security avoids avoiding the avoidable…what the what?

The following is a guest post by Chima Njaka.

network security - lockedThis week TIBCO LogLogic has been taking part at InfoSec Europe, the largest Information Security Event in Europe.  According to initial reports, there are over 17,000 registrants at this year’s event.  We are at booth F50 and we hope to see you there.

One of the highlights about going to one of these shows is the chance to soak up the latest and greatest in information security and put it out for the public (recall my observations from the RSA show earlier this year).  Often, there are regional differences. In EMEA “Big Data” has not yet captured as much attention in IT Security as it has in the States (locals say, “Give it another six months.”).  More often, however, you find common security issues. More common than regional people probably realize.

Avoiding the avoidable

A favorite topic is the latest information on security breaches.  At InfoSec Europe, the 2013 Cyber Security Breaches Survey was officially released, and details of the survey’s results were discussed and reviewed.  One observation I made at RSA noted that 80% of successful security attacks will exploit well-known vulnerabilities that could have been detectable via security monitoring. This finding is corroborated in the UK government’s 10 Steps to Cyber Security recommendations from last year.

Despite this, the 2013 survey found that take up of these basic security guidelines, including analysis of log data to monitor networks, was patchy at best (only 30% of large organizations had followed the guidelines).  As such, perhaps it should come as little surprise the survey’s finding that 93% of large organizations (250+ employees) and 87% of small business had at least one security breach last year.

How long can we avoid avoiding the avoidable?

Chima Njaka is based in Palo Alto, California and has broad experience in developing, selling and marketing technical solutions that include scalable log and security intelligence platforms for the enterprise and cloud. Chima takes pride in helping customers work with terabytes and more of big data coming from their own IT infrastructure.


Tags: ,

Categories: Data Analytics / Big Data, Log data management, Security

Author:Jeanne Roué-Taylor

I'm fascinated by disruptive technology and its impact on our world. I manage sales operations for an excellent startup with a unique team of highly experienced data scientists.

Subscribe to the blog

Subscribe and receive an email when new articles are published

No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: