IBM’s New Cybersecurity Plan: Find Bad Guys Before They Steal - Digits - WSJ

IBM’s new security systems work by ingesting massive amounts of publicly available data from computer networks, software and websites, and establishing patterns of normal behavior. Then it looks for irregularities in how the ingested data behave and are being used, IBM Vice President Marc van Zadelhoff said. One example: finding a PDF reader that is abnormally communicating with servers outside of a company’s infrastructure.

Data analytics also can help companies ferret out real attacks among the millions security “events” that happen each week, van Zadelhoff said. When Target was attacked by hackers who stole credit card data from tens of millions of its customers, the retailer security team saw alerts but the company didn’t act on them. IBM’s systems, for example, would prompt a company to act on an alert that data are being sent to an Internet address that is suspicious or known to be associated with computer criminals, van Zadelhoff said.



http://on.wsj.com/1kPqkH9

Source: http://blogs.wsj.com/digits/2014/05/05/ibms-new-cybersecurity-plan-find-bad-guys-before-they-steal/?mod=WSJBlog
See if people are clicking on this link: http://on.wsj.com/1kPqkH9+
Try the bitly.com sidebar to see who is talking about a page on the web: http://bitly.com/pages/sidebar
To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK For any technical queries re JISC please email [log in to unmask] For any content based queries, please email [log in to unmask]