Juniper Security Expert: Behavior Analytics Helps Address Threat Complexity

By

We’re all at risk.

The cybersecurity threat landscape is becoming more complex. The

always-on nature of cybercrime is straining security personnel. And there’s a large and growing shortage of cybersecurity talent.

“It doesn’t stop – ever,” said Juniper Networks Cybersecurity Strategist Nick Bilogorskiy. “And it’s almost impossible to stop an event.”

The question isn’t whether you’ll be the target of hacker. It’s when and where these threats will arise.

So organizations are changing their cybersecurity strategies, said Bilogorskiy, who presented the closing ITEXPO keynote today. The focus used to be on threat prevention, he said. Now it’s on threat identification and mitigation, he explained.

This is all very challeging, of course. And it’s very scary. And time consuming.

The Ponemon Institute estimates that companies get 12,172 cybersecurity alerts a week. Just 518 of those alerts are investigated – in large part due to the significant resources it takes to look into these events. And, Ponemon and Juniper Networks report, businesses waste more than 352 hours weekly chasing false positives.

But there is some good news here, Bilogorskiy indicated. And that is that behavioral analytics can help. Behavioral analytics uses big data collection, and artifical intelligence and machine learning analysis, to correlate data, learn new behaviors, and high anomalies in user behavior and software execution.

That can help organizations better understand where threats are coming from, who and what are the targets, how far into the killchain the hacker was able to penetrate, and more. This kind of intelligence can help people who use patterns to find infected computers and remediate them do their jobs. But that’s just one use case for behavior analytics.

ITEXPO took place this week in Fort Lauderdale, Florida. 




Edited by Mandi Nowitz
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

8 Underrated Features of Your Mobile Device You Probably Didn't Know About

By: Contributing Writer    11/21/2023

It is easy to get lost in all the new phone releases when multiple happen yearly. Consequently, most new functions go unnoticed because people do not …

Read More

Navigating the Launch: A Step-by-Step Guide to Bringing Your Product to Market

By: Contributing Writer    11/15/2023

Embarking on the journey to bring a new product into the marketplace is an exhilarating adventure that blends the thrill of innovation with the meticu…

Read More

Running MySQL on AWS: Step by Step

By: Contributing Writer    11/15/2023

MySQL on AWS is the deployment of the MySQL database system on Amazon Web Services (AWS) cloud platform. MySQL is one of the most popular open-source …

Read More

4 Easy Responsive Image Techniques

By: Contributing Writer    11/15/2023

Responsive images are a fundamental component in responsive web design. They adapt to the size of the user's screen, delivering the best user experien…

Read More

5 Types of Documentation Tools and How to Choose

By: Contributing Writer    11/9/2023

Documentation tools are specialized software applications designed to help you create, manage, and publish digital documents. These tools are essentia…

Read More