Data is at the center of all security advancements. It fuels better data protection strategies, helps determine where the threats are coming from, and is the new perimeter that needs to be secured, according to Chris Poulin, the Research Strategist for IBM’s X-Force Research & Development team.
Poulin revealed that his organization tries to “gather data from just about everywhere” by crawling websites, looking for websites with malicious software, gathering spam, and trying to figure out who the bad guys are and what tactics they use. “We try to get ahead of the hackers,” he added.
In his live interview at IBM Insight 2014, Poulin told theCUBE hosts Dave Vellante and John Furrier that while mobile, cloud, and Internet of Things do generate more data to breach, they can also assist in protecting it. All of this extra data can be used to do analysis and determine what kind of security can be added, helping to determine who is accessing the phone, how is it calling other devices, etc. “That is what security does; it looks for anomalies among data that is supposed to be valid,” he said.
With data being the new perimeter, Poulin explained, “You need to be able to control the data, assess it. Unless we understand what the data is, we can’t protect it.” How do you protect the data is not the only question. Businesses must also figure out who tries to steal the data itself
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
IBM Insight 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For IBM Insight 2014 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for IBM Insight 2014 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
IBM Insight 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to IBM Insight 2014 | Las Vegas
Please sign in with LinkedIn to continue to IBM Insight 2014 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Chris Poulin - IBM Insight 2014 - theCUBE
Data is at the center of all security advancements. It fuels better data protection strategies, helps determine where the threats are coming from, and is the new perimeter that needs to be secured, according to Chris Poulin, the Research Strategist for IBM’s X-Force Research & Development team.
Poulin revealed that his organization tries to “gather data from just about everywhere” by crawling websites, looking for websites with malicious software, gathering spam, and trying to figure out who the bad guys are and what tactics they use. “We try to get ahead of the hackers,” he added.
In his live interview at IBM Insight 2014, Poulin told theCUBE hosts Dave Vellante and John Furrier that while mobile, cloud, and Internet of Things do generate more data to breach, they can also assist in protecting it. All of this extra data can be used to do analysis and determine what kind of security can be added, helping to determine who is accessing the phone, how is it calling other devices, etc. “That is what security does; it looks for anomalies among data that is supposed to be valid,” he said.
With data being the new perimeter, Poulin explained, “You need to be able to control the data, assess it. Unless we understand what the data is, we can’t protect it.” How do you protect the data is not the only question. Businesses must also figure out who tries to steal the data itself