ARTICLES

UniversalSchema-01.png

Universal Schema — Universal Understanding

Gemini Data Blog, 2017-10-25

What’s common between staying in the best part of town and managing IT?

(Read More)


pexels-photo-212286.jpeg

Building a successful information security monitoring program in an age of overwhelming data

(IN)SECURE Magazine, Issue 55

The majority of security analysts I know have a job that’s made unnecessarily more difficult than it has to be. Everyday they’re charged with finding the veritable needle in a haystack with tools – SIEMs and log management systems – that have struggled with the latest technology trends, such as big data and cloud services. As a result, analysts are wasting time with high volumes of low-value data, and they’re missing valuable clues.

(Read More)


Machine-reasoning-AI.jpg

From Visualizations to Semantic Reasoning: The Evolution of Intelligent Analysis

Gemini Data Blog, 2017-08-14

In cyber security data analysis, visualizations have been used as eye candy for quite a few years, going back as far as the early 2000’s. The network styled visuals don’t necessarily mean the data is stored as graph, and in fact, it rarely is. So what is the difference between an intelligent analysis platform versus one based on simple visualizations?

(Read More)


startup-photos.jpg

What makes a good security analyst: The character traits you need

HelpNetSecurity, 2017-06-28

Of all the skillsets IT decision-makers are looking to hire for, cybersecurity is easily the most challenging. According to Global Knowledge’s 10th annual IT Skills and Salary Survey, 31% of IT decision-makers have a difficult time finding qualified cybersecurity talent. And when it comes to hiring a security analyst, the challenge goes beyond simply finding candidates with the right technical skills.

An analyst’s personal experience and biases can be just as valuable or detrimental to their success in the job. Here are three work traits that make the difference between a good security analyst and a bad one.

(Read More)