iSight Partners, a company that
specializes in computer security, has taken the next step in viral protection. The
analysts from iSight “spend their day digging around the underground web,
piecing together hackers' intentions, targets and techniques to provide their
clients with information like warnings of imminent attacks and the latest tools
and techniques being used to break into computer networks.” This company stands
to protect United States military personnel from explosive detonations and
other types of bombs in the field of battle.
The biggest
loss of life in Iraq was not from Snipers or general combatants, but from concealed
explosive devices. The goal of the company, when they increase in size is to
prevent IEDs explosions and save lives of military and natives. These bombs
often take the lives of innocent natives as collateral damage in hopes of
killing American troops.
iSight
separates themselves from normal online cyber-security organizations is that
the iSight anticipates what enemies plan to do before they have their own plan
set. These online securities only act after the fact of cyber-invasion or
attack. The analysts from iSight are fluent over 21 languages and watch the
creators of the bombs buy and assemble their bombs through underground cyber
tools.
iSight did
not invent cyber protection and analytics, therefore, they have numerous
competitors. Their largest competitors come from banks. Banks hire former
intelligence members to find suspicious activity, primarily identify fraud.
This is such an important cause that the current chief executive officer of
Bank of America said there is no cap to their cyber-security fund. It is critical
for all people of society.
Business
across all field have “been investing in ‘big data’ analytics tools that sound
alarms anytime someone does something unusual.” The one problem with this is
that these servers are constantly alarming because nearly all activity is being
noted. “The average organization receives 16,937 alerts a week. Only 19% of
these are deemed ‘reliable.’” The software needs more of a filter as far as
what it takes in form information. That is the problem with “big data.”
A problem
with this software is that they are wasting billions of dollars on alerts. A
venture capitalist that invests in the company stated “they don’t have time.
They need human, actionable threat intelligence.” They have great technology in
their iSight software, but they need an intelligent human to sift through data
in a more efficient way. The states for a future IPO may project success, but it’s
the human being that makes the important call.
This field
is growing rapidly, and iSight is leading the way. Gartner, a research firm,
believes iSight will be used by “60% of businesses to incorporate threat
intelligence into their defensive threat strategy” by 2018. The need for online
security is underrated at the moment. The benefits of this can go way beyond
just military use. Identity fraud and online theft can be prevented before a
customer loses their assets.
http://www.nytimes.com/2015/09/14/technology/intelligence-start-up-goes-behind-enemy-lines-to-get-ahead-of-hackers.html
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.