Crowdsourced Splunking for Security Exploits
Crowdsourced correlation search development in security information and event management (SIEM) tools such as Splunk is a best practice for security monitoring and user awareness. For some SIEM systems such as Splunk, IT power users or administrators can develop searches.… Continue reading
Securing the Internet of People and Things (IOPT)
Listening to Jim Kobielus – IBM’s Big Data Evangelist – speak on security for the Internet of Things (IoT) I was struck by the need for big companies to incorporate more of a user-centric perspective into their thinking.
As Kobielus… Continue reading
Speaking at the 2013 Privacy by Design User Forum Tomorow
Tomorrow, I’ll be speaking at the 2013 Privacy by Design User Forum in Toronto, CA.
Only have time for a quick note as I rush off to the airport, but the event is described at http://www.2013pbdforum.ca/ as… Continue reading