In my experience, and in the experience of many others as well, unfocused attempts at visualization over raw, unreduced data produce visualizations that are not particularly useful for security operations. Visualization does have tremendous potential to bring value to security operations when leveraged properly. Performing data reduction by posing specific, targeted, incisive queries into the data provides a good starting point for producing visualizations of high value to security operations. Get the picture?
The same is true for eDiscovery data. I’ve seen many a user go straight to a visualization of email connections, for example, over their entire dataset, and then dismiss the use of visualizations because there’s nothing useful in it. Which, of course, there isn’t. You need to define what kinds of connections you’re looking for (Over a date range, to/from one particular custodian of interest, etc.) before you start looking at the pictures that are going to show them to you.
Facebook’s own statement about this is a little scary: ““We removed several Groups from Facebook after detecting content that violated our policies. We’ve since discovered that this content was posted to sabotage legitimate, non-violating Groups. We’re working to restore any Groups affected and to prevent this from happening again.”” I mean if you want to…
Because if my value to my team is only a factor of productivity versus cost, and not as a human being, why should I put my own mental wellbeing at risk for you?
That makes no sense, and we are seeing more and more people recognize this fact. Either figure out how to support the human beings who work for you, or stop hiring them.
At least that way you aren’t actively harming anyone with your job.
This isn’t new. It’s the reason things like the Panama Papers exist, because law firms have a whole lot of data about their clients, information that those clients usually do a really good job of protecting – “It’s an issue about the data, fundamentally,” says Jake Olcott, a vice president at BitSight Technologies, a cybersecurity…
So Saturday night, after hosting two seperate holiday gatherings at our house, one Friday night, the other Sat afternoon, Angela asked me if I could grab the pictures off the SD card using my PocketPC, because she had left our card reader at work. OK, no problem. I plug the SD card into the PocketPC,…
This is an interesting observation, in fact, I was just considering something similar the other day, about how we went from relishing the freedom of expression that blogging provided anyone and everyone, to where we are today, trying to shut people up on social media. For most of my life, the internet, particularly its social…
What’s interesting about this is the timing. Obviously with Deflategate there was an inability to get texts from Tom Brady’s phone, but having a mobile forensics expert wouldn’t have changed that. You need access to the phone. Is the NFL planning on making that part of the CBA, that players have to turn over their…
Subscribe to the weekly newsletterEvery new post, plus a lot more content about Careers and the Workplace, Mental Health at Work, eDiscovery, Privacy and Security delivered each week to your inbox!