A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
Learning how alleged fraudsters hacked systems and traded in stolen credit- and debit-card numbers can help organizations take steps to protect their customers' and stakeholders' sensitive information.
The story on how the FBI built its case against Jarand Moen Romtveit in an international carding sting gives IT security practitioners valuable insights on how one individual works in the murky world of hacking.
In what is being called "the largest coordinated international law enforcement action in history directed at carding crimes," 24 suspects have been arrested in a fraud scheme likely involving more than 400,000 accounts.
A new malware intelligence system created by Georgia Tech Research Institute aims to create an information sharing center. How will the system work and how can organizations participate? GTRI's Chris Smoak furnishes the answers.
Some organizations are focusing so much attention on the bring-your-own-device trend and on implementing a mobile device management system that they're neglecting mobile app security issues, says security expert Jeff Williams.
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
Memorial Sloan-Kettering Cancer Center in New York is notifying 880 patients that some of their personal information may have been exposed when it was inadvertently embedded in PowerPoint charts posted on two websites.