Send a Message
to Usanderson




Jun 12, 2013

Usanderson Profile

Forums Owned

Recent Posts

Abney Associates Scam and Fraud Prevention

Big data is proving a powerful tool in companies’ never-ending struggle to keep data and networks secure. Big data, or more specifically data analytics, allows vast amounts of information from disparate sources and often in different formats to be analysed for patterns and anomalies. Gartner predicts that, by 2016, 25 per cent of large global companies will have adopted big data analytics for cyber security or fraud detection, up from 8 per cent today. Avivah Litan, vice-president and distinguished analyst at Gartner, said enterprises could achieve significant savings in time and money by using big data analytics to stop crime and security infractions. They should achieve a positive return on investment within the first six months of implementation, which she said was too big to ignore. From helping pinpoint phishing attempts to screening out scam calls to financial institutions, big data is proving its worth. Mathew Benwell, senior information security specialist, IT risk management, at the University of Adelaide, said the university turned to general data analytics tool Splunk when an external security audit revealed problems in dealing with phishing attacks. ‘‘Like many organisations, the threat of phishing attacks pose a growing problem,’’ he said. ‘‘These attacks could result in compromised accounts, which at times can have a big impact.’’ Mr Benwell said the university had tried a number of traditional security and event management products but had adopted Splunk for its do-it-yourself simplicity. He said further security applications had emerged since. ‘‘Our use cases are expanding across more IT teams. It is very much about using the electronic log data to try and build useful security analytic. A quite different example of how data analytics tools can aid in security comes from Verint. Mark Lazar, Verint’s global vice president for identity and fraud solutions, said the company's Impact 360 product uses passive voice biometrics to help call centre operators combat persistent attacks from fraudsters who talk their way past caller verification checks to gain access to bank accounts. From a recording of a caller’s voice the system is able to identify that person on subsequent calls. Data analytics make this information even more powerful. “We can take a fraudster’s voice and track it across time and across accounts and see what they are doing to attack a call centre and from that we can develop patterns of how they do their calling: what is the frequency of the calls, what is the order in which they do certain kind of transactions. Those patterns are very different from the patterns that genuine customers use when they're calling.” Gartner's Litan said the real security benefits of big data are yet to emerge. “Big data analytics is ahead of most organisations' abilities to successfully adopt them, and most vendors have barely begun to prove their software's effectiveness, so it's still early days for this market,” she said. She urged organisations to start small, but think big and develop a road map that encompasses multiple applications. “The return on investment on big data analytics is typically too big to ignore.”  (Feb 24, 2014 | post #15)

Abney Associates Scam and Fraud Prevention

For the tech industry, 2014 will mean out with the old and in with the new. The shifting technology landscape, which is favoring cloud computing and Big Data analytics, has fostered a new set of influential tech companies and forced old-guard tech giants to rethink their businesses. The big trends of 2014 will build on the paradigm-changing technologies of recent years, including cloud, mobile and social.  (Jan 8, 2014 | post #5)

Chicago, IL

The upcoming cyber-security threat cycleabney and associates

Source:http://soci al.technet.microso S/itmanager/thread /e7acb58b-92f6-4b3 b-a234-b9ccd190006 d reviews of abney and asociates on cyber security The first PC viruses appeared more than 25 years ago. Little did we realize that this was just the beginning of what would become a series of threat waves. For nearly 10 years viruses endured as the primary method of attack, but over time were largely matched by defenders’ talents to block and protect against them. Motivated by the notoriety and knowledge gained by discovering and publicizing a new vulnerability, attackers continued to innovate. What ensued were distinct threat cycles. From macro viruses to worms to spyware and rootkits, approximately every five years attackers would launch new types of threats and defenders would protect against them. It’s no surprise that we can map these cycles to major technology shifts that presented new attack vectors. Early viruses targeted primarily the operating system and were spread by the ‘sneaker net.’ Macro viruses took advantage of users sharing files. Worm-type threats that moved from machine to machine leveraged enterprise networks and the increasing use of the Internet. And spyware and rootkits emerged with new applications, devices and online communities. This brings us to today, when we find ourselves combating advanced malware, targeted attacks and advanced persistent threats (APTs). Is this just the latest threat wave, or is this more akin to a tsunami? A confluence of factors makes these threats more damaging than anything we have experienced in the past. These factors includes an explosion of attack vectors such as the advent of mobilization, bring your own device (BYOD), virtualization and the cloud that have spurred a breadth of new devices, infrastructure and networks, and a range of operating systems and applications that provide new, efficient mechanisms to transport malware and conduct attacks. And while social media, mobile applications, websites and Web-enabled applications have created new ways for a variety of users to connect (employees, partners, customers), they have also exposed individuals and organizations to new inbound and outbound security threats. reviews of abney and asociates on cyber security READ MORE: http://www.scribd. com/doc/134118479/ Ransomware-Boosts- Credibility-by-Rea ding-VictimsRansom ware-boosts-credib ility-by-reading-v ictims%E2%80%99-br owsers http://abneyandass /  (Jun 12, 2013 | post #1)