Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Big Data’s Big Peril: Security

By Bill Bradley
March 6, 2018

We live in a world that is more digitally connected than ever before, and this trend will continue well into the foreseeable future. Mobile phones, televisions, washers and dryers, self-driving cars, traffic lights, and the power grid – all will be connected to the Internet of Things. It has been said that by 2020 there will be 50 billion connected things. These devices produce exponentially growing amounts of data such as emails, text files, log files, videos, and photos.

The world will create 163 zettabytes (a zettabyte equals one sextillion bytes) of data annually by 2025. Enterprises of all sizes can gain competitive advantages and valuable insights by incorporating big data and predictive analytics into their business strategies to fuel growth and drive operational efficiencies. But with all this data at hand, it’s vital to understand which data is actionable, and how it needs to be considered. Here are two examples of ways businesses are utilizing big data to improve the bottom line.

First, big data analytics can reduce customer churn. Predictive models are being built using customer demographics, product profile, customer complaint frequency, social media, and disconnect orders to flag customers who are likely to churn. Companies can identify these customers to better understand their issues and improve inefficient business processes. They can also recommend products that meet customer feature and price needs.

Second, big data can help prevent network outages. This is especially critical with government, medical, and emergency services networks, where outages can have severe impacts. Predictive models can ingest network logs to look at past device performance and predict hours in advance when an outage may occur, giving network engineers time to replace faulty equipment.

To process the large volume, velocity, and variety of data being produced, businesses are standing up data lakes to take in traditional structured data from relational databases and data warehouses, along with unstructured data from social media feeds and system logs. However, many of the applications that populate data lakes were built years ago and provide protection at the application level, not the data level. Such application-level protections are potentially voided when businesses move the data into an enterprise data lake. Additionally, many times businesses do not properly categorize and protect newer, unstructured data sources using role-based security. Data lakes could contain customer data that cyber criminals can use to perform identity and bank theft, impacting hundreds of millions of people. In addition, confidential business information and intellectual property can be at risk.

It is critical to realize that no single organization has all the answers. Businesses should partner with solutions providers and other organizations that have faced the same big data security challenges.

For example, companies have partnered with other organizations to both secure their growing big data platforms and enable digital transformation. There are service providers that can categorize the data moving into enterprise data lakes and identify appropriate security controls. Other providers can assist with encrypting data in transit and at-rest, as well as applying policy-based access controls, allowing employees access only to the data they need to do their jobs.

Going forward, organizations must find creative ways to identify those who access their databases, systems, and networks in order to safeguard these vital assets. Therefore, we need to invest in the next wave of identity access management solutions, such as continuous authentication.

Continuous authentication uses a person’s behavioral or biometric characteristics to periodically re-authenticate users. For example, organizations can use keystroke-based pattern identification to quickly detect if an imposter is at the keyboard, lock the user account, and then trigger an alarm to security operations to take appropriate action. In addition, all of today’s laptops and mobile devices are equipped with a camera. Facial recognition technology can be used to continuously verify that the person looking at the screen is the expected user.

While beneficial to organizations, continuous authentication can lead to privacy, notification, and security issues that must be considered. Many employees have concerns over “big brother” watching them. One possibility is to strategically select which users and systems require continuous authentication, and only deploy such solutions for those identified as high risk. Employers can then make it clear that a higher level of monitoring is a job requirement. In addition, continuous authentication may capture personally identifiable information and, as a result, will be subject to privacy laws. Finally, before these solutions are widely deployed, businesses must address security requirements. We must ensure that malicious actors cannot hijack this technology. We must collaborate across the public and private sectors to resolve all these issues.

Big data and analytics continue to dramatically improve business operations and the customer experience. However, your organization will only realize these benefits if you are willing to invest in security. And we must have a broader societal conversation about the appropriate balance between security and privacy. At the end of the day, organizations still need to focus on security basics and get that right. This includes increased security awareness training and vulnerability management. Otherwise, your organization could become the victim of the next major data breach.

KEYWORDS: analytics cyber security data security Internet of Things

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill bradley 2017

Bill Bradley is Senior Vice President, Cyber Engineering and Technology Services for CenturyLink. He has more than 32 years of experience in cyber security and information technology with roles ranging from software developer to CTO and CIO. He leads a global workforce to ensure the company is protected and that its cyber technology services customers receive support from a trusted partner with deep technical experience. For more information, contact Bill Bradley via LinkedIn. Or, visit: http://www.centurylink.com/business/enterprise/it-security.html.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing Security with Big Data, the Internet of Things and Social Media

    See More
  • How Will Big Data Change Security?

    See More
  • Big data

    How Leveraging Big Data Changes the Perception of Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing