Infographic Snapshot

Oct. 29, 2013
Analyzing a few billion web clicks reveals most common security manager activities and exactly where to focus user experience improvements

An unusual data source for big data analysis in the security domain is web server log files. What’s unusual is that it’s not security data per se. Rather, for cloud-based security systems, the data represents security personnel actually performing their jobs. Why is this important?

Consumer-oriented web companies intensely study online user behavior to improve their applications, yet security system customers appear to be last in line for such user experience (UX) enhancement. That’s a detriment to our customers and the people we protect. A simple example of what we can extract from a few billion Web clicks is to understand which activities security managers perform most often; thereby pinpointing exactly where we should focus future user experience improvements. 
 

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.