Print

Print


IBM’s New Cybersecurity Plan: Find Bad Guys Before They Steal - Digits -
WSJ

IBM’s new security systems work by ingesting massive amounts of publicly
available data from computer networks, software and websites, and
establishing patterns of normal behavior. Then it looks for irregularities
in how the ingested data behave and are being used, IBM Vice President Marc
van Zadelhoff said. One example: finding a PDF reader that is abnormally
communicating with servers outside of a company’s infrastructure.

Data analytics also can help companies ferret out real attacks among the
millions security “events” that happen each week, van Zadelhoff said. When
Target was attacked by hackers who stole credit card data from tens of
millions of its customers, the retailer security team saw alerts but the
company didn’t act on
them<http://online.wsj.com/news/articles/SB10001424052702304703804579381520736715690>.
IBM’s systems, for example, would prompt a company to act on an alert that
data are being sent to an Internet address that is suspicious or known to
be associated with computer criminals, van Zadelhoff said.


http://on.wsj.com/1kPqkH9

Source:
http://blogs.wsj.com/digits/2014/05/05/ibms-new-cybersecurity-plan-find-bad-guys-before-they-steal/?mod=WSJBlog
See if people are clicking on this link: http://on.wsj.com/1kPqkH9+
Try the bitly.com sidebar to see who is talking about a page on the web:
http://bitly.com/pages/sidebar

To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK
To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK

For any technical queries re JISC please email [log in to unmask]
For any content based queries, please email [log in to unmask]