Dark Reading -
The days of looking at log files to find security breaches are long gone. Don’t get me wrong — log files are still useful. They are vital to confirming a breach and its cause, and necessary for forensics and remediation workflows. But manually sifting through logs to identify trouble is a waste of time in an era during which data grows exponentially, seemingly by the hour. This is further compounded by the complex interconnectedness and opacity of the digital supply chain necessary to deliver modern services.
For many of us, sitting through high school and college math courses, such as calculus, spurred a common question: “When am I ever going to use this in real life?” But for those of us that found our way to the information security world, the answer to that question is “now.”
It’s time for organizations across industries to take a page from the financial services book
The post The New Secret Weapon in Breach Detection: Math and Data Science first appeared on Dark Reading.