Please wish me luck! My next research quarter (that I just started up) will be an ultimate example of schizophrenia. Specifically, I will handle two separate projects:
- Using “big data” methods and analytic approaches for security (this research will go into my paper on “SIEM Futures” or maybe into a new paper)
- Patching and otherwise remediating vulnerabilities in operating systems and applications (this research will update my existing VM research)
In other words, I will travel the entire realm of security maturity from “how to we patch Windows effectively?” [yes, people do still ask that!] all the way to “how do we detect novel attacks in petabytes of data?” in the land of Hadoop, MongoDB, neural networks and AIs.
As usual, my call to action:
- Vendors, got anything to say about using “big data” methods for security? Here is a briefing link … you know what to do!
- Enterprises, got a “big data helps security” story – either a WIN story or a FAIL story – to share? Hit the comments or email me privately (Gartner client NDA will cover it, if you are a client).
- Security consultants focused on analytics, got a “big data” analytics story (maybe inspired by your recent project) to share? I’d love to hear it as well!
P.S. OK, fine, you can also share a patching story .. I won’t hold it against you 🙂
Possibly related posts:
- My Next Research Area: Incident Response
- 9 Reasons Why Building A Big Data Security Analytics Tool Is Like Building a Flying Car
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.