News
News
3/14/2014
04:17 PM
Connect Directly
RSS
E-Mail
50%
50%

3 Ways Big Data Can Help Fix Internet Security

OpenDNS CTO Dan Hubbard explains how big data can help address three major Internet security weaknesses.

Where there's connectivity, danger lurks -- which essentially means those living and breathing in today's digitized world and doing anything at all on the Internet are ever in harm's way. But maybe, just maybe, big data will help keep us safe.

Certainly that's the expectation of CTO Dan Hubbard and his colleagues at OpenDNS, a cloud-based provider of Internet security and DNS services. I talked this week with Hubbard about harnessing big data for security -- a topic he'll address at the upcoming Interop Las Vegas 2014 conference.

As Hubbard explained to me, one of OpenDNS's key assets is a huge user footprint, with more than 50 million users around the world. "When we built our security team two years ago, we thought about this a lot," he said. "[Because of this user footprint], we knew we had this highly diversified, distributed set of data. We knew that our data was really valuable."

By combining security expertise, data science know-how, and Hadoop/big data smarts, OpenDNS reasoned it would be able to address three big weaknesses of Internet security today.


Going back in time

The first weakness has to do with the "time continuum" of today's security solutions, which move forward from the first known victim. "Typically, what happens is someone or some entity -- a server, client, phone, whatever -- will get infected," Hubbard explained. "After that, the defenders get a copy of what's out there, and then they react to that copy." From a security perspective, that means you're always behind the bad guys.

Read the rest of this article on All Analytics.

Beth Schultz has more than two decades of experience as an IT writer and editor.  Most recently, she brought her expertise to bear writing thought-provoking editorial and marketing materials on a variety of technology topics for leading IT publications and industry ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BobH088
50%
50%
BobH088,
User Rank: Apprentice
3/16/2014 | 3:03:12 PM
protection solution
One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags (mystufflostandfound.com) let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel like my phone, passport and luggage after one of the tags was responsible for getting my lost laptop returned to me in Rome one time.
IT's Reputation: What the Data Says
IT's Reputation: What the Data Says
InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Government Tech Digest Oct. 27, 2014
To meet obligations -- and avoid accusations of cover-up and incompetence -- federal agencies must get serious about digitizing records.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and community news at InformationWeek.com.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.