Juniper Security Expert: Behavior Analytics Helps Address Threat Complexity

By

We’re all at risk.

The cybersecurity threat landscape is becoming more complex. The

always-on nature of cybercrime is straining security personnel. And there’s a large and growing shortage of cybersecurity talent.

“It doesn’t stop – ever,” said Juniper Networks Cybersecurity Strategist Nick Bilogorskiy. “And it’s almost impossible to stop an event.”

The question isn’t whether you’ll be the target of hacker. It’s when and where these threats will arise.

So organizations are changing their cybersecurity strategies, said Bilogorskiy, who presented the closing ITEXPO keynote today. The focus used to be on threat prevention, he said. Now it’s on threat identification and mitigation, he explained.

This is all very challeging, of course. And it’s very scary. And time consuming.

The Ponemon Institute estimates that companies get 12,172 cybersecurity alerts a week. Just 518 of those alerts are investigated – in large part due to the significant resources it takes to look into these events. And, Ponemon and Juniper Networks report, businesses waste more than 352 hours weekly chasing false positives.

But there is some good news here, Bilogorskiy indicated. And that is that behavioral analytics can help. Behavioral analytics uses big data collection, and artifical intelligence and machine learning analysis, to correlate data, learn new behaviors, and high anomalies in user behavior and software execution.

That can help organizations better understand where threats are coming from, who and what are the targets, how far into the killchain the hacker was able to penetrate, and more. This kind of intelligence can help people who use patterns to find infected computers and remediate them do their jobs. But that’s just one use case for behavior analytics.

ITEXPO took place this week in Fort Lauderdale, Florida. 




Edited by Mandi Nowitz
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Executive Editor, TMC

SHARE THIS ARTICLE
Related Articles

Enhancing Cybersecurity Measures for Modern Businesses

By: Contributing Writer    7/2/2025

Cyberattacks are rising, and businesses of all sizes feel the pressure. Small companies often think they're too small to be targets. They aren't. Hack…

Read More

Lessons Learned from Enterprise Oracle Cloud Migrations

By: Contributing Writer    7/1/2025

Switching to Oracle Cloud can feel daunting. Security risks, unexpected expenses, and performance troubles often turn what seems like an effortless up…

Read More

Protecting Business Assets with Smarter Security Frameworks

By: Contributing Writer    7/1/2025

Protecting your business is more challenging than ever. Cyber threats are increasing every day. Hackers target small and large businesses alike, searc…

Read More

Emerging Trends in Technology and Their Impact on Future Innovations

By: Contributing Writer    7/1/2025

Technology is changing faster than ever. Business owners often struggle to keep up. What's trending today might be outdated tomorrow. Falling behind c…

Read More

Tech Podcast Award Winners Bring Excitement and Enthusiasm to a Range of Important Tech Topics

By: TMCnet Staff    6/18/2025

Tech Podcast Award winners produce engaging, informative, and often entertaining content, bringing valuable insight from industry front lines to the e…

Read More