News
News
3/14/2014
04:17 PM
50%
50%

3 Ways Big Data Can Help Fix Internet Security

OpenDNS CTO Dan Hubbard explains how big data can help address three major Internet security weaknesses.

Where there's connectivity, danger lurks -- which essentially means those living and breathing in today's digitized world and doing anything at all on the Internet are ever in harm's way. But maybe, just maybe, big data will help keep us safe.

Certainly that's the expectation of CTO Dan Hubbard and his colleagues at OpenDNS, a cloud-based provider of Internet security and DNS services. I talked this week with Hubbard about harnessing big data for security -- a topic he'll address at the upcoming Interop Las Vegas 2014 conference.

As Hubbard explained to me, one of OpenDNS's key assets is a huge user footprint, with more than 50 million users around the world. "When we built our security team two years ago, we thought about this a lot," he said. "[Because of this user footprint], we knew we had this highly diversified, distributed set of data. We knew that our data was really valuable."

By combining security expertise, data science know-how, and Hadoop/big data smarts, OpenDNS reasoned it would be able to address three big weaknesses of Internet security today.


Going back in time

The first weakness has to do with the "time continuum" of today's security solutions, which move forward from the first known victim. "Typically, what happens is someone or some entity -- a server, client, phone, whatever -- will get infected," Hubbard explained. "After that, the defenders get a copy of what's out there, and then they react to that copy." From a security perspective, that means you're always behind the bad guys.

Read the rest of this article on All Analytics.

Beth Schultz has more than two decades of experience as an IT writer and editor.  Most recently, she brought her expertise to bear writing thought-provoking editorial and marketing materials on a variety of technology topics for leading IT publications and industry ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
BobH088
50%
50%
BobH088,
User Rank: Apprentice
3/16/2014 | 3:03:12 PM
protection solution
One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags (mystufflostandfound.com) let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel like my phone, passport and luggage after one of the tags was responsible for getting my lost laptop returned to me in Rome one time.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.