article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

However, when analyzed by new algorithmic data mining methods, big data can reveal patterns, trends, and associations that can, among other things, relate to human behavior and interactions. Solutions that protect data-at-rest, in use, and in transit form an important part of the enterprise’s information security strategy.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

Mine was 2000. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. And that's where we adapt to that situation with open source intelligence and think, you know, our, our strategy is, let's go find everything in the universe that fits a few different human nature patterns.

IT 40