{"id":2948,"date":"2012-08-01T14:14:00","date_gmt":"2012-08-01T14:14:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2324329"},"modified":"2012-08-01T14:14:00","modified_gmt":"2012-08-01T14:14:00","slug":"big-data-analytics-are-key-for-security-practices-and-more","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/big-data-analytics-are-key-for-security-practices-and-more\/","title":{"rendered":"Big Data Analytics Are Key for Security Practices and More"},"content":{"rendered":"<p>ISF urges business to use Big Data Analytics for security purposes \u2013 in a recent ISF study, they had six key findings as well a large number of recommendations. \u201cThe key recommendation is for organizations to exploit their existing data analytics capabilities, to identify security areas that can be addressed, and to start small with a limited pilot project.\u201d<br \/>\nRevised Cybersecurity Act of 2012 Again Goes Before US Senate \u2013 the re-worked Cybersecurity Act of 2012 might be able to pass through the senate. The earlier bill did not pass due to issues with digital privacy and personal freedoms. \u201cThis revised legislation would establish a robust public\u2010private partnership to improve the cybersecurity of our nation\u2019s most critical infrastructure, which is mostly owned by the private sector,<br \/>\nas stated by the bill.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2324329\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISF urges business to use Big Data Analytics for security purposes \u2013 in a recent ISF study, they had six key findings as well a large number of recommendations. \u201cThe key recommendation is for organizations to exploit their existing data analytics c&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-2948","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=2948"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/2948\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=2948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=2948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=2948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}