Application Security // Database Security
12:00 AM
Connect Directly

IT Security Faces Big Data Skills and Resource Gap

In the near future, IT security teams will not be complete without at least one data scientist among its ranks.

As IT security leaders try to base more of their day-to-day decisions on statistical analysis of relevant data coming from IT infrastructure and business processes, they're running into a skills and resource gap. Often security teams have lots of specialists with deep technical knowledge of attack techniques and trends, but they frequently lack the skills to aggregate and manipulate data in order to draw meaningful conclusions from statistical trends.

As the speed and volume of security data continues to mount, so will that gap, which is why many within the industry believe that in the coming years, an IT security team will not be complete without at least one data scientist among its ranks.

"In the past, it has always been us who has been behind the game, trying to catch up with the attackers' techniques," says Dan Mitchell, product manager of data sciences for RSA, The Security Division of EMC. "I think data science gives us the opportunity to get ahead of the attackers and have them be behind for a change."

Read the rest of this article on Dark Reading.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
11/18/2013 | 9:51:02 AM
Interesting thoughts. I think that to reduce the gap continuous and current training needs to be implemented. CompTIA have provided some informative insights why this benefits businesses (closes the gap, reduces downtime and increases productivity) and benefits employees (giving them the confidence and skills to do their job properly). You may find this interesting?
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-02
Buffer overflow in Canary Labs Trend Web Server before 9.5.2 allows remote attackers to execute arbitrary code via a crafted TCP packet.

Published: 2015-10-02
Cisco NX-OS 6.0(2)U6(0.46) on N3K devices allows remote authenticated users to cause a denial of service (temporary SNMP outage) via an SNMP request for an OID that does not exist, aka Bug ID CSCuw36684.

Published: 2015-10-02
Cisco Email Security Appliance (ESA) 8.5.6-106 and 9.6.0-042 allows remote authenticated users to cause a denial of service (file-descriptor consumption and device reload) via crafted HTTP requests, aka Bug ID CSCuw32211.

Published: 2015-10-01
lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.

Published: 2015-10-01
kernel_crashdump in Apport before 2.19 allows local users to cause a denial of service (disk consumption) or possibly gain privileges via a (1) symlink or (2) hard link attack on /var/crash/vmcore.log.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.