In my experience, and in the experience of many others as well, unfocused attempts at visualization over raw, unreduced data produce visualizations that are not particularly useful for security operations. Â Visualization does have tremendous potential to bring value to security operations when leveraged properly. Â Performing data reduction by posing specific, targeted, incisive queries into the data provides a good starting point for producing visualizations of high value to security operations. Â Get the picture?
The same is true for eDiscovery data. I’ve seen many a user go straight to a visualization of email connections, for example, over their entire dataset, and then dismiss the use of visualizations because there’s nothing useful in it. Which, of course, there isn’t. You need to define what kinds of connections you’re looking for (Over a date range, to/from one particular custodian of interest, etc.) before you start looking at the pictures that are going to show them to you.
Yeah, no one ever misuses these kinds of tools, right? Nope, nothing to worry about here, they are only ever used to target bad guys. You have nothing to fear from them.
10 Body Language Tips Every Speaker Must Know (Infographic) tags: Training MM France Just Made It Illegal To Answer Work Emails After 6 P.M. tags: Management MM OLP Launches the First Litigation Support Certification Exam: First of its kind will set industry standards tags: LitSupport MM Mobile Apps Are Killing The Free Web, Handing A…
As I look at the workplaces that have remained remote, versus the ones who couldn’t wait to get back to “normal”, I suspect this has a lot to do with the difference: “The Covid-19 crisis has distanced people from the workplace, and employers have generally, if sometimes reluctantly, accepted that people can work effectively from…
This Harvard Study Says The Happiest People Have More Time And Less Money Against Metrics: How Measuring Performance by Numbers Backfires On Your Mark? An Early Working List of 2020 eDiscovery Events Legal Tech Companies Need Not Seek Input of Lawyers In Product Development Are organisations giving cybersecurity the attention it needs? Preserving Social Media…
Some things I noticed this morning in my blog reading: I’m not the only one having trouble with hotels. Jenny is dealing with a hotel that promised her high speed internet access, but doesn’t really have it. How do you get that wrong? You either have it or you don’t. On the good news front,…
ACLU: Face-recognition systems won’t work Now let me get this straight, the systems would have only stopped 2 of the 19 terrorists, maybe, if they worked perfectly and the CIA had good accurate pictures of them. The system only works about 90% of the time, meaning hundreds of people everyday are going to be misidentified…