Günther Niederreiter
4. December 2014 0

A danger seen in time is a danger avoided

Nothing stays still, all is flux. The great Greek philosopher Heraclitus knew all this back in ancient times and today we cannot avoid the conclusion that nothing endures but change, and that we constantly need to adapt quickly to new circumstances. This is especially true of the methods used in cybercrime.

For criminologists, it is no longer possible to combat the criminals without the use of sophisticated data analysis. This is confirmed by a BITKOM survey. In 2012, 63 percent of companies surveyed recognized attacks on their computer and data networks by cybercriminals or foreign intelligence agencies as a real threat. By 2014 this figure had increased to 74 percent. And such attacks getting ever more sophisticated. That is why big data analysis is becoming indispensable for IT security and fraud detection, in tracing highly sophisticated threats, insider attacks and account takeovers. Real time analysis enjoys a special role in such efforts. Because criminals are modifying their attacks at an ever increasing speed. The goal is to recognize the tell-tale patterns that indicate attacks. Organizations and business can use such analyses to very quickly get a picture of the security situation in their environment and thus to respond to threats in time.

For example, server log data management systems accumulate enormous quantities of computer-generated data. The task is to collect these data, aggregate them at a central point, store them over long periods, analyze log data in real time, and to search through log data and generate standard behavior patterns. The real challenge facing security units is posed not just by the huge volumes of log data, but also by the number of different log formats that need to be analyzed.

The day of manual searching is over

These days it is no longer possible to conduct evaluations and analyses manually. This is especially so where log files need to be compared against each other in order to assess a state of affairs or to troubleshoot a problem situation. Is it possible, for example, that a debit card could be inserted into an ATM in Nuremberg 15 minutes after being used in Aschaffenburg? Probably not. But IT security experts’ need to identify such suspicious changes or operations as quickly as possible – ideally in real time – requires the use of the very latest technologies and solutions.

What all this means is that as well as the growing need to handle internal data with extreme care and to increase employee awareness of cyber-threats, businesses also need to protect themselves by using the latest technology and security software. Doing anything less will inevitably lead to enormous financial losses, even where such losses are generated by damage to a company’s image.

Let’s communicate big!
Günther Niederreiter

Leave a Reply

Your email address will not be published. Required fields are marked *

By sending this comment you accept our comment policy.

a) Blog visitors are always invited to comment.

b) Comments are supposed to increase the value of this weblog.

c) Comments will be activated only after validation.

d) Comments which do not relate to the topic, obviously violate copyrights, have offensive content or contain personal attacks will be deleted.

e) Links can be inserted to the comment but should refer to the topic of the blog post. Links to other websites or blogs which do not refer to the posting will be considered as spam and will be deleted.



tsystemsCom @tsystemsCom
T-Systems  @tsystemsCom
"30 million meals are processed in Germany each day" says #TSystems VP @ihofacker at smart #foodlogistics workshop… https://t.co/57Dkzm2qBW 
T-Systems  @tsystemsCom
"In a few years from now each first contact with a company will be a #bot contact", believes #TSystems CMO @svnkrgr https://t.co/TSmp4VZoMf 
T-Systems  @tsystemsCom
"Now is the time to really integrate content marketing" says #TSystems CMO @svnkrgr #next17 #futureofmarketing https://t.co/UK8HHZpUKP 
T-Systems  @tsystemsCom
IT chiefs should make implementing the #digitalworkplace core to their digitisation strategy @Computerweekly: https://t.co/WFf4YECw7K 
T-Systems  @tsystemsCom
Fast #VPN access, firewalls with a click: #TSystems launches global #SDWAN. As one of the first @ngenagmbh partners… https://t.co/4gkVMNULd7 
T-Systems  @tsystemsCom
#Security strategy: The European Union (EU) has detailed how it intends to improve its cyber defences @zdnet: https://t.co/uv44WEg0q9 
T-Systems  @tsystemsCom
Kurt Koch: 50 years at @deutschetelekom/T-Systems. HR Director Georg Pepping congratulates on the central anniversa… https://t.co/5UrjRHYh0m