Warning: session_start(): open(/opt/alt/php72/var/lib/php/session/sess_59e4f831ce16f30eeb711ae6ca948328, O_RDWR) failed: Disk quota exceeded (122) in /home/shweuqjw/awajludhianaki.org/wp-content/plugins/jnews-social-login/class.jnews-social-login.php on line 83

Warning: session_start(): Failed to read session data: files (path: /opt/alt/php72/var/lib/php/session) in /home/shweuqjw/awajludhianaki.org/wp-content/plugins/jnews-social-login/class.jnews-social-login.php on line 83
It’s time for security teams to embrace security data lakes – TechCrunch - Awaj Ludhiana Ki
Saturday, June 7, 2025
  • Home
  • National
  • International
  • Movies
  • Technology
  • Business
  • Fitness
  • Lifestyle
  • Punjab
  • Contact us
No Result
View All Result
No Result
View All Result
Home Technology

It’s time for security teams to embrace security data lakes – TechCrunch

by author
June 5, 2021
in Technology
0
It’s time for security teams to embrace security data lakes – TechCrunch
0
SHARES
40
VIEWS
Share on FacebookShare on Twitter


Dan Schoenbaum
Contributor

Dan Schoenbaum is a two-time CEO and a two-time COO in cybersecurity. Today, he is a managing partner at High Tide Advisors, a boutique consulting firm helping companies achieve greater success through go-to-market strategies and execution.

The average corporate security organization spends $18 million annually but is largely ineffective at preventing breaches, IP theft and data loss. Why? The fragmented approach we’re currently using in the security operations center (SOC) does not work.

Related posts

With Wickr purchase, AWS enters the encrypted messaging business – TechCrunch

With Wickr purchase, AWS enters the encrypted messaging business – TechCrunch

June 25, 2021
Mercuryo raises $7.5M for crypto-focused, cross-border payments after crossing $50M in ARR – TechCrunch

Mercuryo raises $7.5M for crypto-focused, cross-border payments after crossing $50M in ARR – TechCrunch

June 25, 2021

Here’s a quick refresher on security operations and how we got where we are today: A decade ago, we protected our applications and websites by monitoring event logs — digital records of every activity that occurred in our cyber environment, ranging from logins to emails to configuration changes. Logs were audited, flags were raised, suspicious activities were investigated, and data was stored for compliance purposes.

The security-driven data stored in a data lake can be in its native format, structured or unstructured, and therefore dimensional, dynamic and heterogeneous, which gives data lakes their distinction and advantage over data warehouses.

As malicious actors and adversaries became more active, and their tactics, techniques and procedures (or TTP’s, in security parlance) grew more sophisticated, simple logging evolved into an approach called “security information and event management” (SIEM), which involves using software to provide real-time analysis of security alerts generated by applications and network hardware. SIEM software uses rule-driven correlation and analytics to turn raw event data into potentially valuable intelligence.

Although it was no magic bullet (it’s challenging to implement and make everything work properly), the ability to find the so-called “needle in the haystack” and identify attacks in progress was a huge step forward.

Today, SIEMs still exist, and the market is largely led by Splunk and IBM QRadar. Of course, the technology has advanced significantly because new use cases emerge constantly. Many companies have finally moved into cloud-native deployments and are leveraging machine learning and sophisticated behavioral analytics. However, new enterprise SIEM deployments are fewer, costs are greater, and — most importantly — the overall needs of the CISO and the hard-working team in the SOC have changed.

New security demands are asking too much of SIEM

First, data has exploded and SIEM is too narrowly focused. The mere collection of security events is no longer sufficient because the aperture on this dataset is too narrow. While there is likely a massive amount of event data to capture and process from your events, you are missing out on vast amounts of additional information such as OSINT (open-source intelligence information), consumable external-threat feeds, and valuable information such as malware and IP reputation databases, as well as reports from dark web activity. There are endless sources of intelligence, far too many for the dated architecture of a SIEM.

Additionally, data exploded alongside costs. Data explosion + hardware + license costs = spiraling total cost of ownership. With so much infrastructure, both physical and virtual, the amount of information being captured has exploded. Machine-generated data has grown at 50x, while the average security budget grows 14% year on year.

The cost to store all of this information makes the SIEM cost-prohibitive. The average cost of a SIEM has skyrocketed to close to $1 million annually, which is only for license and hardware costs. The economics force teams in the SOC to capture and/or retain less information in an attempt to keep costs in check. This causes the effectiveness of the SIEM to become even further reduced. I recently spoke with a SOC team who wanted to query large datasets searching for evidence of fraud, but doing so in Splunk was cost-prohibitive and a slow, arduous process, leading the team to explore alternatives.

The shortcomings of the SIEM approach today are dangerous and terrifying. A recent survey by the Ponemon Institute surveyed almost 600 IT security leaders and found that, despite spending an average of $18.4 million annually and using an average of 47 products, a whopping 53% of IT security leaders “did not know if their products were even working.” It’s clearly time for change.



Source link

Previous Post

Save water: We need a lot of blue to stay green

Next Post

BREAKING: Shooting can finally commence in Maharashtra from June 7 as state government announces unlock plan : Bollywood News

Related Posts

With Wickr purchase, AWS enters the encrypted messaging business – TechCrunch
Technology

With Wickr purchase, AWS enters the encrypted messaging business – TechCrunch

June 25, 2021
Mercuryo raises $7.5M for crypto-focused, cross-border payments after crossing $50M in ARR – TechCrunch
Technology

Mercuryo raises $7.5M for crypto-focused, cross-border payments after crossing $50M in ARR – TechCrunch

June 25, 2021
Kaszek Ventures leads a $15 million round in Chilean asset management startup, Fintual – TechCrunch
Technology

Kaszek Ventures leads a $15 million round in Chilean asset management startup, Fintual – TechCrunch

June 25, 2021
Kayak co-founder Paul English just launched Moonbeam, a podcast discovery app – TechCrunch
Technology

Kayak co-founder Paul English just launched Moonbeam, a podcast discovery app – TechCrunch

June 25, 2021
Gotrade gets $7M led by LocalGlobe to let investors around the world buy fractional shares of U.S. stocks – TechCrunch
Technology

Gotrade gets $7M led by LocalGlobe to let investors around the world buy fractional shares of U.S. stocks – TechCrunch

June 25, 2021
To sustain diversity, investors must tune into their unconscious biases – TechCrunch
Technology

To sustain diversity, investors must tune into their unconscious biases – TechCrunch

June 24, 2021
Next Post
BREAKING: Shooting can finally commence in Maharashtra from June 7 as state government announces unlock plan : Bollywood News

BREAKING: Shooting can finally commence in Maharashtra from June 7 as state government announces unlock plan : Bollywood News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

RECOMMENDED NEWS

Wolf-Henning Scheider, CEO, ZF Group, Auto News, ET Auto

Wolf-Henning Scheider, CEO, ZF Group, Auto News, ET Auto

4 years ago
World Environment Day 2021: Here’s how this company is recycling plastic waste into elegant carpets 

World Environment Day 2021: Here’s how this company is recycling plastic waste into elegant carpets 

4 years ago
ETAuto Report, Auto News, ET Auto

ETAuto Report, Auto News, ET Auto

3 years ago
Hyderpora killings: Omar Abdullah stages protest seeking return of bodies to families | India News

Hyderpora killings: Omar Abdullah stages protest seeking return of bodies to families | India News

4 years ago

BROWSE BY CATEGORIES

  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fitness
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel

BROWSE BY TOPICS

Architecture culture Fitness indian architecture indian culture indian culture and heritage indian news lifestyle national news Technology technology news Travel travelling

About Us

Awaj Ludhiana Ki

Address

2667/3, Kishore Nagar, Tajpur & Jail Road, Ludhiana – 141008

Recent News

  • Chhal Kapat: The Deception trailer out: Shriya Pilgaonkar starrer Zee5 show to start streaming from June 6, watch : Bollywood News
  • Indian Navy Set To Induct First Anti-Submarine Shallow Water Warship ‘Arnala’ On June 18 | India News
  • Rahul Gandhi Claims Maharashtra-Like Poll Rigging Will Happen In Bihar; BJP Hits Back With ‘Fake Narrative’ Jibe | India News
  • China To Give Pakistan Most Advanced J-35A Stealth Fighter With 400-KM PL-17 Missiles; How Will India Counter The Threat? | World News
  • Rekha starrer Umrao Jaan gets 4K re-release in cinemas from June 27: “None of us could have imagined the timelessness of the film” : Bollywood News

Category

  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fitness
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel

Search

No Result
View All Result

Email

contact@awajludhianaki.org

  • About
  • Advertise
  • Careers

Copyright © 2019 Awaj Ludhiana Ki or it's affiliates | Website by Awaj Ludhiana Ki Team

No Result
View All Result
  • Home
  • Contact us
  • Animals
  • Architecture
  • Automobiles
  • Business
  • Culture
  • Fashion
  • Fitness
  • Food
  • International
  • Lifestyle
  • Movies
  • National
  • Sports
  • Technology
  • Travel
  • Punjab

Copyright © 2019 Awaj Ludhiana Ki or it's affiliates | Website by Awaj Ludhiana Ki Team

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In