According to SANS most recent security analytics survey, organizations rely heavily on log management and SIEM platforms to collect a lot of data about security events but have trouble sifting through it in order to uncover problems that need immediate attention.
More specifically, survey participants could not pin-point and follow up on security events that indicate potential attacks in the massive amount of collected data.
How can organizations find “attack indicator” needles in their big data haystacks?
Listen to Episode 105 of our Security Slice podcast and hear Craig Young and Tim Erlin discuss the marketing origins of the term “big data,” the key differences between physical and digital theft, and the two items that should be on your security analytics shopping list.
SOURCE: tripwire.com
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.