Günther Niederreiter
4. December 2014 0
Digitization

A danger seen in time is a danger avoided

Nothing stays still, all is flux. The great Greek philosopher Heraclitus knew all this back in ancient times and today we cannot avoid the conclusion that nothing endures but change, and that we constantly need to adapt quickly to new circumstances. This is especially true of the methods used in cybercrime.

For criminologists, it is no longer possible to combat the criminals without the use of sophisticated data analysis. This is confirmed by a BITKOM survey. In 2012, 63 percent of companies surveyed recognized attacks on their computer and data networks by cybercriminals or foreign intelligence agencies as a real threat. By 2014 this figure had increased to 74 percent. And such attacks getting ever more sophisticated. That is why big data analysis is becoming indispensable for IT security and fraud detection, in tracing highly sophisticated threats, insider attacks and account takeovers. Real time analysis enjoys a special role in such efforts. Because criminals are modifying their attacks at an ever increasing speed. The goal is to recognize the tell-tale patterns that indicate attacks. Organizations and business can use such analyses to very quickly get a picture of the security situation in their environment and thus to respond to threats in time.

For example, server log data management systems accumulate enormous quantities of computer-generated data. The task is to collect these data, aggregate them at a central point, store them over long periods, analyze log data in real time, and to search through log data and generate standard behavior patterns. The real challenge facing security units is posed not just by the huge volumes of log data, but also by the number of different log formats that need to be analyzed.

The day of manual searching is over

These days it is no longer possible to conduct evaluations and analyses manually. This is especially so where log files need to be compared against each other in order to assess a state of affairs or to troubleshoot a problem situation. Is it possible, for example, that a debit card could be inserted into an ATM in Nuremberg 15 minutes after being used in Aschaffenburg? Probably not. But IT security experts’ need to identify such suspicious changes or operations as quickly as possible – ideally in real time – requires the use of the very latest technologies and solutions.

What all this means is that as well as the growing need to handle internal data with extreme care and to increase employee awareness of cyber-threats, businesses also need to protect themselves by using the latest technology and security software. Doing anything less will inevitably lead to enormous financial losses, even where such losses are generated by damage to a company’s image.

Let’s communicate big!
Günther Niederreiter

Leave a Reply

Your email address will not be published. Required fields are marked *

By sending this comment you accept our comment policy.

a) Blog visitors are always invited to comment.

b) Comments are supposed to increase the value of this weblog.

c) Comments will be activated only after validation.

d) Comments which do not relate to the topic, obviously violate copyrights, have offensive content or contain personal attacks will be deleted.

e) Links can be inserted to the comment but should refer to the topic of the blog post. Links to other websites or blogs which do not refer to the posting will be considered as spam and will be deleted.

 
 

Twitter

tsystemsCom @tsystemsCom
T-Systems  @tsystemsCom
Internet of Things development center: @Telekom_Group and @FraunhoferIML are founding the Telekom Open IoT Labs:… https://t.co/PwOwoElmm2 
T-Systems  @tsystemsCom
Information overload: is your business making the most of its data? @itproportal: https://t.co/5mlGiL85TL #BigData https://t.co/QA45Exa858 
T-Systems  @tsystemsCom
Future networks: Virtualization technology is unlocking the wide area network - the SD-WAN provides new connections… https://t.co/66B2WaziRp 
T-Systems  @tsystemsCom
If you’re not in the #Cloud, you’re isolated from innovation, says @IDC in its Top10 2018 predictions… https://t.co/pBSLA1u4dR 
T-Systems  @tsystemsCom
The right analytics tool for every scenario: #TSystems offers a range of #cloud-based tools – each fulfilling diffe… https://t.co/4OeSBYcwtC 
T-Systems  @tsystemsCom
What about the #GDPR? The Open #TelekomCloud is compliant with all requirements: https://t.co/Kp9C9rg49K #Security #Cloud 
T-Systems  @tsystemsCom
#IoT will continue its rapid growth rate in 2018, shows study by @cradlepoint & @Spiceworks @eWEEKNews:… https://t.co/3VEpyjbIqz 
T-Systems  @tsystemsCom
Keep going. Keep growing. Berlin is ready to host our #TSystems #Partnerdays 2017 with prominent guests and Partner… https://t.co/NPUkCmq9Qy 
T-Systems  @tsystemsCom
“We can control digital complexity for our customers” - that is the résumé from 5 exciting days at the #TSBeachBar https://t.co/0APmnpvtfZ