Application Security // Database Security
11/15/2013
00:00 AM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

IT Security Faces Big Data Skills and Resource Gap

In the near future, IT security teams will not be complete without at least one data scientist among its ranks.

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business processes, they're running into a skills and resource gap. Often security teams have lots of specialists with deep technical knowledge of attack techniques and trends, but they frequently lack the skills to aggregate and manipulate data in order to draw meaningful conclusions from statistical trends.

As the speed and volume of security data continues to mount, so will that gap, which is why many within the industry believe that in the coming years, an IT security team will not be complete without at least one data scientist among its ranks.

"In the past, it has always been us who has been behind the game, trying to catch up with the attackers' techniques," says Dan Mitchell, product manager of data sciences for RSA, The Security Division of EMC. "I think data science gives us the opportunity to get ahead of the attackers and have them be behind for a change."

Read the rest of this article on Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Lindsay379
50%
50%
Lindsay379,
User Rank: Apprentice
11/18/2013 | 9:51:02 AM
Training
Interesting thoughts. I think that to reduce the gap continuous and current training needs to be implemented. CompTIA have provided some informative insights why this benefits businesses (closes the gap, reduces downtime and increases productivity) and benefits employees (giving them the confidence and skills to do their job properly). You may find this interesting? http://skillsboost.comptia.org/companies
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5700
Published: 2014-09-22
Multiple cross-site scripting (XSS) vulnerabilities in Baby Gekko before 1.2.2f allow remote attackers to inject arbitrary web script or HTML via the (1) id parameter to admin/index.php or the (2) username or (3) password parameter in blocks/loginbox/loginbox.template.php to index.php. NOTE: some o...

CVE-2014-0484
Published: 2014-09-22
The Debian acpi-support package before 0.140-5+deb7u3 allows local users to gain privileges via vectors related to the "user's environment."

CVE-2014-2942
Published: 2014-09-22
Cobham Aviator 700D and 700E satellite terminals use an improper algorithm for PIN codes, which makes it easier for attackers to obtain a privileged terminal session by calculating the superuser code, and then leveraging physical access or terminal access to enter this code.

CVE-2014-3595
Published: 2014-09-22
Cross-site scripting (XSS) vulnerability in spacewalk-java 1.2.39, 1.7.54, and 2.0.2 in Spacewalk and Red Hat Network (RHN) Satellite 5.4 through 5.6 allows remote attackers to inject arbitrary web script or HTML via a crafted request that is not properly handled when logging.

CVE-2014-3635
Published: 2014-09-22
Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows remote attackers to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one m...

Best of the Web
Dark Reading Radio