Archive | Tech Insight RSS feed for this archive

Cybersecurity Big Data Overload?

October 22, 2017

0 Comments

Overview: The Cyber Big Data Conundrum Organizations are challenged with the spiraling overhead associated with storing and processing ever inflating sets of cybersecurity data. Many admit they are struggling to evidence improved security event detection and decision making. A growing realization is that big data must be turned into smart data: relevant, high-quality data which […]

Continue reading...

Cybersecurity Data Science: Adopting a Medical Paradigm

July 24, 2017

0 Comments

An Uncomfortable Status Quo This month, barely eight weeks from the WannaCry ransomware outbreak, yet another destructive worm attack has disabled systems and compromised data globally: PetrWrap (AKA NotPetya, Nyetya, or GoldenEye). Beleaguered cybersecurity professionals have responded yet again with a flurry of patches and guidance to plug the holes. Based on trending events, there is […]

Continue reading...

Data Science for Cyber Risk Management (PRMIA)

June 6, 2017

0 Comments

Cyber threat actors exploit increasingly interconnected networks to infiltrate infrastructure and compromise digital assets. While prolific networks and digitization drive interactivity, thereby opening new opportunities for collaboration, open channels also increase the scope and scale of potential cyber risks. Beyond compromised intellectual property and regulatory strictures, reputational damage can result in customer and partner attrition, […]

Continue reading...

SAS Forum Switzerland 2017

May 18, 2017

0 Comments

Posting from SAS Forum Switzerland 2017 Lovely day in Zurich for SAS Forum Switzerland.  Hearing about the latest data analytics developments in Switzerland.  Topics and trends covered: Cloud & internet of things Risk, fraud, and compliance Customer analytics Big data & data science Today I will be presenting with my colleague Allan Russell on ‘Data […]

Continue reading...

Data Science – Tools and Methods: Practitioner Perspectives

April 20, 2017

0 Comments

Data Science – Tools and Methods: Practitioner Perspectives Erasmus University Rotterdam lecture to Masters of Business and Information Management (BIM) students for Big Data and Business Analytics class. Wednesday, April 12th, 2017.  

Continue reading...

Getting Data Right

March 23, 2017

0 Comments

Brief coverage of and link to O’Reilly ebook ‘Getting Data Right’

Continue reading...

Data Science for Cyber Security? Challenges and Opportunities from FloCon 2017

January 10, 2017

0 Comments

Blogging from FloCon cyber security conference in San Diego #FloCon17 Although not a morning person by nature, the early 7 am kick-off session was quite painless as I am still jet lagged on Amsterdam time (+9 hours, making this an easy 4pm session!). While I was aware of a range of Linux-based open source tools for […]

Continue reading...

Reblog: Machine learning overview with SAS software

July 13, 2015

0 Comments

Machine learning overview with SAS software. From a SAS colleague, Longhow Lam http://5.100.228.219/#portfolio

Continue reading...

Fighting Fraud and Cyber Threats with the power of Network Analytics

February 6, 2015

0 Comments

New blog post published for Deloitte – view original post: Both fraudsters and cyber attackers take advantage of an increasingly interconnected world to infiltrate and assault financial and virtual infrastructures. Especially sophisticated electronic interactions bind people together in complex, global networks. While such networks have created new opportunities for interaction and commerce, they have also […]

Continue reading...

Reblog: How to use phone calls and network analysis to identify criminals

January 13, 2015

0 Comments

An excellent, hands-on demonstration of the power of social network analysis (SNA) via graph analytics to detect criminality from colleagues at Linkurious and a U.S.-based police detective: http://linkurio.us/how-to-use-phone-calls-and-network-analysis-to-identify-criminals/ SNA at times can seem too theoretical to stakeholders – this is an excellent example of a hands-on, engineering focused application with real practical value.  Applies Neo4J graph […]

Continue reading...