Application Security // Database Security
12:00 AM
Connect Directly

IT Security Faces Big Data Skills and Resource Gap

In the near future, IT security teams will not be complete without at least one data scientist among its ranks.

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business processes, they're running into a skills and resource gap. Often security teams have lots of specialists with deep technical knowledge of attack techniques and trends, but they frequently lack the skills to aggregate and manipulate data in order to draw meaningful conclusions from statistical trends.

As the speed and volume of security data continues to mount, so will that gap, which is why many within the industry believe that in the coming years, an IT security team will not be complete without at least one data scientist among its ranks.

"In the past, it has always been us who has been behind the game, trying to catch up with the attackers' techniques," says Dan Mitchell, product manager of data sciences for RSA, The Security Division of EMC. "I think data science gives us the opportunity to get ahead of the attackers and have them be behind for a change."

Read the rest of this article on Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/18/2013 | 9:51:02 AM
Interesting thoughts. I think that to reduce the gap continuous and current training needs to be implemented. CompTIA have provided some informative insights why this benefits businesses (closes the gap, reduces downtime and increases productivity) and benefits employees (giving them the confidence and skills to do their job properly). You may find this interesting?
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio