now browsing by tag


International Conference on Social Media, Wearable and Web Analytics

General Cybersecurity Conference

 June 11 – 12, 2018 | Glasgow, United Kingdom

Cybersecurity Conference Description

IEEE is the Technical Co-Sponsor (TCS) of the International Conference on Social Media, Wearable and Web Analytics (Social Media 2018), an international refereed conference dedicated to the advancement of social media, security of social media and consequential impacts and risks due to compromise or security breaches. It covers economic importance of social media, the emergence of wearable, wearable for fitness, e-health and life style improvements, and the use of web analytics for social media enhancements, business intelligence and business empowerment.

With the wave of phishing attacks against celebrities, high profile government officials, and nationals on social media, this conference is timely. Most importantly, we seek recommendations, solutions and advice on ways, methods and techniques for protecting our digital society.

The aim of the Social Media 2018 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

Social Media 2018 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

The conference proceedings will be submitted for consideration for publishing and listing on the following bibliographic indexes: IEEE Computer Society Digital Library, IEEE Xplore Digital Library, DBLP Computer Science, Scopus, CiteSeerX, Computer Science Index, EI Compendex, Academic Search Complete, CiteULike, Google Scholar & Microsoft Academic Search.


The post International Conference on Social Media, Wearable and Web Analytics appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Improving #Cyber Security with #Analytics and #Automation

Source: National Cyber Security – Produced By Gregory Evans

While cyber security grows more complex by the day, some aspects of it are all too clear. The number of threats to large organisations have spiked in recent years, as have the number of bad actors who create them. It is now evident that no company is safe. However, the majority of organisations across the globe are still ill-prepared to handle a sophisticated modern cyber attack. Cyber security professionals are now turning to analytics and automation to try and deal with the problem.

Today, IT is up against advanced persistent threats (APTs). The intention of an APT attack is to steal data rather than to cause damage to the network or organisation. Many of these attacks are being spearheaded by vast hordes of automated bots rather than human hackers.

Simply put, IT personnel are no match for such intensive, sustained attacks. Not only are humans incapable of keeping up with the sheer volume of incoming threats, but their ability to make quick decisions to manually address such an attack is inherently inefficient.  As a result, data breaches are already becoming increasingly commonplace. In 2016 alone, half a billion personal records were stolen or lost.

The emergence of The Internet of Things (IoT) only serves to further increase the demand for improved cyber security as millions more devices come online each year.  Writing for The New York Times, Zeynep Tufekci (self described “Techno-sociologist”), highlighted the sorts of risks we may see emerge as more products and appliances come with in-built connectivity.

“Connecting everyday objects introduces new risks if done at mass scale. Take a ‘smart’ refrigerator for example. If a single fridge malfunctions, it’s a hassle. However, if the fridge’s computer is connected to its motor, a software bug or hack could “brick” millions of them all at once — turning them into plastic pantries with heavy doors,” she said.

Could analytics and automation rescue cyber security from these mounting challenges?

A different approach to cyber security

Traditional approaches to addressing cyber attacks employ “threat signatures” based on patterns of previous attacks. But such techniques are of little help when it comes to preventing new types of attacks as James Packer, Cyber Security Professional and Founder of the London Chapter of ISC2, explained:

“Threat signatures are a very effective mechanism to identify and protect against 99% of attacks. The limitations of using signature based detection however comes with the remaining 1%; zero-day exploits. Threat signatures are created using existing knowledge of how particular attacks are executed. With zero-day exploits, this knowledge is absent i.e. they exploit newly discovered vulnerabilities in unknown ways. When sole reliance is placed on having an awareness of a type of an attack, without this awareness, detection and prevention controls are entirely ineffective,” he said.

A promising solution that is currently being explored is to use analytics to predict and screen novel threats and then deploy automated systems to take corrective actions. While we are still a long way off the emergence of fully automated cyber security systems, James pointed to the clear signs of progress in this field.

“Security operations centres (SOCs) across the globe are increasingly tuning technology in line with possible attack scenarios to automate and streamline the incident response process. Furthermore, advanced analytics enables better decision making in security. Using machine learning to analyse attack trends can highlight particular areas of weakness that may have been previously unrecognisable.

“With too much data being produced for humans to interpret, training computers to understand patterns aids in detecting attacks such as “low-and-slow” attacks – those which are both subtle and prolonged,” he said.

The same software and modeling approaches used to identify credit card fraud (a form of anomaly detection) is now being applied to behaviors in cybersecurity attacks. Unlike threat signatures, these tools offer some protection against newly-emerging threats.

Currently, the major limitation of such tools is the investment required in terms of capital and resources. It is an expensive process to build tools which are tailored to the environment they protect. Furthermore, the vendors which are making these products are still in their infancy.

“Most of the major providers such as Tenable and FireEye were founded in the mid 00’s which is young in terms of software houses. This is reflected in their offerings – they lack full-feature sets that link the products to the business processes that they support,” said James.

Mass consolidation, mergers, and acquisitions are likely to improve the state of the security tooling market over the coming years.

“We have already seen big companies snapping up boutique products and ingesting them into their own portfolios. Microsoft’s acquisition of Hexadite and Cisco’s acquisition of CloudLock are two notable examples,” said James.

The future cyber security landscape

Of course, technology will never be a panacea for cyber security problems. Even though automated actions can be undertaken, in most cases organisations will want to investigate problems identified by analytics before taking corrective action. The investigation requires research, testing, and possibly even interviews for internal threats – all of which involve human experts.

The most effective cyber security environments will inevitably be complex hybrids of human and machine intelligence. Interactions between analytics-driven alerts, automated actions and human inputs will be crucial for effective security.

“It is human attackers that gave rise to the need to have human defenders; until the point in time comes when a machine can truly think like a human, I believe there will always be the need for human interaction. And when the day that machines can think like a human does come, I think we will have much greater concerns than job losses!” said James.

Organisations in both public and private sectors are now using analytics and, to a lesser degree, automation to improve their security systems. While there may be some doubt about when such technologies will fully mature,  their necessity becomes clearer with every major cyber attack.

The post Improving #Cyber Security with #Analytics and #Automation appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Data Analytics: The #New Tool To Prevent #Cyber Security #Attacks

Source: National Cyber Security – Produced By Gregory Evans

Data Analytics: The #New Tool To Prevent #Cyber Security #Attacks

Cyber attacks and security breaches are now a constant threat for businesses. Costing the global economy $450 billion in 2016, they’re now occurring with increased regularity, which in turn has forced businesses to focus more on cybersecurity protocols to protect their key data.

A report issued by Malwarebytes showed that over one billion Malware-based incidents manifested between June and November of 2016, and it’s expected that most of those incidents actually went unnoticed until they had breached a network.

A primary target for cybercriminals are the gaps found when big data files are stored, and following the introduction of the cloud, with its unlimited storage facilities, a new avenue has been opened for hackers to penetrate a system. Allowing for the storage of larger datasets in one place, which can then be simultaneously accessed by numerous people, it’s this transition from data centre storage to the cloud that cybercriminals are looking to target. If security protocols of a business are not enforced and up-to-date then a system can be breached.

However, it isn’t only big data storage systems that now harbor potential threats. Cybercriminals have now begun to utilize smartphones and wearable technology to breach a company network. With statistics showing that four out of five UK adults now own a smartphone, many of which access secure work WiFi networks on a daily basis, it has opened up as the next route that hackers are choosing to exploit.

As the threat from cybercriminals increases, businesses can’t take data security lightly, as cybercriminals are constantly finding new ways to access a system.

Detecting a threat as soon as it penetrates a security firewall is not an easy task by any means, and when a breach does happen there’s no simple fix. They are, however, manageable, and it’s data analytics that has become the newest line of security to help stop threats and increase protection.

A recent survey found that 53% of businesses use data analytics to detect high-security threats to their business. This is a figure which should increase, as findings from a report by the Ponemon Institute shows that an organisation is 2.25 times more likely to recognise a threat within hours or minutes if they implement data analytics.

What is data analytics?

The process of data analytics involves data specialists examining large sets of data to uncover anomalies that are not normally seen by the naked eye. Analysts will sift through data searching for unknown correlations in figures or hidden patterns, and from the information collected, they’re able to perform a comprehensive analysis, and use their findings to identify and deter cyber attacks.

To identify if and when a security breach may happen, analysts will apply predictive analysis techniques to data when it’s under examination. Using statistical methods such as predictive modelling, it enables analysts to use statistics to predict potential outcomes. Partnered with data mining, in which analysts sift through large amounts of historical data, they are then able to cross-examine it with real-time data in order to firm up their predictions.

If a threat area is identified, security protocols will then be implemented, alongside algorithms relevant to the data type or structure which are placed in the development code. This should then close the vulnerability and stop firewall breaches instantaneously.

What can it do for your business?

Despite the ability for data analytics to offer a solution to a daily problem, it’s still something that hasn’t been put to full use by businesses. But with software now available that can be used to aid analysis of larger datasets such as Hadoop, it’s becoming a more mainstream solution.

The data gathered during the analytics process will provide a business with a better understanding of cyber attacks arming them with the correct tools to ultimately stop them from happening. It also allows IT security teams to protect businesses from the inside out.

Larger organisations often have an in-house team constantly monitoring security. But for smaller businesses, there are still options to increase your security protocols. Systems such as managed security service providers offer some network security management, which can be used if your business simply doesn’t have the resources to hire a large team of experts.

Data analytics can also help to quash the potential threats from inside your organisation. Using a security information and event management system (SIEM), businesses are able to monitor devices that are connected to the network, and through the data collected, if a security risk is identified it can be halted.

Implementing data analytics is a practice that every business can use to protect themselves against cyber attacks, increasing their front line of defence, the information collected can help improve security on a business network, and could – in the future – mean an end to the unpredicted breaches to security systems.


The post Data Analytics: The #New Tool To Prevent #Cyber Security #Attacks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How data analytics can boost health IT security

Source: National Cyber Security – Produced By Gregory Evans

It’s frightening to consider that the new generation of combat might extend to the very hospital beds of our wounded veterans. But no less than that is at risk when we talk about security of health IT systems. Because of development and acquisition cycles, a medical device is already three…

The post How data analytics can boost health IT security appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Pearl Software Releases Echo Smart.Capture™ For Targeted Cybersecurity Analytics

Pearl Software, the creator of real-time, mobile Internet monitoring and web filtering has released Echo Smart.Capture as part of its cybersecurity product line. Pearl Echo Version 12 R2 now includes the ability to monitor a user’s web browsing while filtering … View full post on National Cyber Security Ventures

Thycotic Acquires Security Analytics Company to Identify Malicious Privileged Behavior Across Systems and Users


Source: National Cyber Security – Produced By Gregory Evans

Thycotic Acquires Security Analytics Company to Identify Malicious Privileged Behavior Across Systems and Users

WASHINGTON, Nov. 9, 2016 /PRNewswire/ — Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, today announced it has completed the acquisition of Virginia-based Cyber Algorithms, provider of network security analytics. Terms of the

The post Thycotic Acquires Security Analytics Company to Identify Malicious Privileged Behavior Across Systems and Users appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Countering Cyber Attacks With Big Data And Analytics

Source: National Cyber Security – Produced By Gregory Evans

Executive Summary Organizations are challenged today as never before to protect their information assets, as well as the underlying networks and services that gather, store, process, and transmit this information. The same better, faster, cheaper information and communication technologies (ICT) that promise to make organizations more successful also present new means, motive, and opportunity to those who would steal information and use it for their own purposes. The most malicious actors are laser-focused on expanding and monetizing their hacking exploits; while legitimate organizations need to balance their security concerns among their other important objectives. Most organizations deal with attacks, for the most part successfully, on a number of fronts. For example, they manage end user access to applications and data stores, with authentication and authorization controls. Networks are secured by virtue of tunneling and encryption protocols, and through the use of firewalls, gateways and intrusion detection systems. Many large enterprises also have built, or contracted with service providers to operate, 24/7 security operations centers (SOCs), equipped with security information and event management systems (SIEMS), and manned by trained personnel. Unfortunately, current security solutions are simply not sufficient to protect organizations, especially from cyber-attacks based on advanced persistent threats (APTs). These […]

For more information go to, http://www., or

The post Countering Cyber Attacks With Big Data And Analytics appeared first on National Cyber Security.

View full post on National Cyber Security

Benchmark cybersecurity analytics service delivers new vulnerability management insightsNational Cyber Security – Subscribe to CBS Los Angeles for more updates now: Get the latest headlines, including a sports and weather update, with the CBS… #gregoryevans #HTCS #PSO #B4Inc An ope…

View full post on Hi-Tech Crime Solutions Daily

Benchmark cybersecurity analytics service delivers new vulnerability management insights

Top Priority Sector:  cyber_security Penn State’s College of Information Sciences and Technology, in partnership with Tripwire, a provider of risk-based security and compliance management solutions, has announced that the top 25 percent of vulnerability management contributors scanned their networks nearly continuously and had an average aggregate host risk score of 2. Read More….

For more information go to, http://www., or

View full post on National Cyber Security