Overview: The Cyber Big Data Conundrum Organizations are challenged with the spiraling overhead associated with storing and processing ever inflating sets of cybersecurity data. Many admit they are struggling to evidence improved security event detection and decision making. A growing realization is that big data must be turned into smart data: relevant, high-quality data which […]
Continue reading...
An Uncomfortable Status Quo This month, barely eight weeks from the WannaCry ransomware outbreak, yet another destructive worm attack has disabled systems and compromised data globally: PetrWrap (AKA NotPetya, Nyetya, or GoldenEye). Beleaguered cybersecurity professionals have responded yet again with a flurry of patches and guidance to plug the holes. Based on trending events, there is […]
Continue reading...
Cyber threat actors exploit increasingly interconnected networks to infiltrate infrastructure and compromise digital assets. While prolific networks and digitization drive interactivity, thereby opening new opportunities for collaboration, open channels also increase the scope and scale of potential cyber risks. Beyond compromised intellectual property and regulatory strictures, reputational damage can result in customer and partner attrition, […]
Continue reading...
Blogging from FloCon cyber security conference in San Diego #FloCon17 Although not a morning person by nature, the early 7 am kick-off session was quite painless as I am still jet lagged on Amsterdam time (+9 hours, making this an easy 4pm session!). While I was aware of a range of Linux-based open source tools for […]
Continue reading...
This week generated a meme which nearly melted the internet: the case of the gold or blue dress. A picture of dress worn at a wedding was seen by some people as being gold and white and others as blue and black. A riotous global argument that cast friends and lovers against one another ensued. While […]
Continue reading...
As many traditional industrial age business functions become subject to disintermediation by automation and expert analytics systems, new industries and value propositions will need to be framed by an emerging generation of leaders.
Continue reading...
Recent collected posts and links to fraud detection and mitigation items: Network analytics for fraud detection & mitigation (video demostration) Part 1 video demo Part 2 video demo Semantics analytics lecture (Erasmus RSM) Demonstration of semantic analytics (video demonstration) Blog post Excuse me, do you speak fraud? Blog post Network analytics for fraud detection Blog post Network analytics: more than […]
Continue reading...
In the mid-1980’s I worked as an information analyst / data manager in a police station in a small town in New England (northeast U.S.). It was a strange but exciting experience for a young man, chosen simply as I was identified as the local ‘computer geek’ at the town high school (a small and […]
Continue reading...
Excuse me, do you speak fraud? Network graph analysis for fraud detection and mitigation by Scott Mongeau Executive summary Network analysis offers a new set of techniques to tackle the persistent and growing problem of complex fraud. Network analysis supplements traditional techniques by providing a mechanism to bridge investigative and analytics methods. Beyond base visualization, […]
Continue reading...
Network analysis is a rapidly growing analytics domain propelled by the explosion of interest in social networking. The methods rest upon much older foundations in the realms of statistics and social science. Euler’s graph theory was proposed in the early 18th century and Moreno established the foundations for social network analysis (SNA) in the 1930’s. Want […]
Continue reading...
October 22, 2017
0 Comments