Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Big Data’s Big Peril: Security

By Bill Bradley
logical responsive default security
March 6, 2018

We live in a world that is more digitally connected than ever before, and this trend will continue well into the foreseeable future. Mobile phones, televisions, washers and dryers, self-driving cars, traffic lights, and the power grid – all will be connected to the Internet of Things. It has been said that by 2020 there will be 50 billion connected things. These devices produce exponentially growing amounts of data such as emails, text files, log files, videos, and photos.

The world will create 163 zettabytes (a zettabyte equals one sextillion bytes) of data annually by 2025. Enterprises of all sizes can gain competitive advantages and valuable insights by incorporating big data and predictive analytics into their business strategies to fuel growth and drive operational efficiencies. But with all this data at hand, it’s vital to understand which data is actionable, and how it needs to be considered. Here are two examples of ways businesses are utilizing big data to improve the bottom line.

First, big data analytics can reduce customer churn. Predictive models are being built using customer demographics, product profile, customer complaint frequency, social media, and disconnect orders to flag customers who are likely to churn. Companies can identify these customers to better understand their issues and improve inefficient business processes. They can also recommend products that meet customer feature and price needs.

Second, big data can help prevent network outages. This is especially critical with government, medical, and emergency services networks, where outages can have severe impacts. Predictive models can ingest network logs to look at past device performance and predict hours in advance when an outage may occur, giving network engineers time to replace faulty equipment.

To process the large volume, velocity, and variety of data being produced, businesses are standing up data lakes to take in traditional structured data from relational databases and data warehouses, along with unstructured data from social media feeds and system logs. However, many of the applications that populate data lakes were built years ago and provide protection at the application level, not the data level. Such application-level protections are potentially voided when businesses move the data into an enterprise data lake. Additionally, many times businesses do not properly categorize and protect newer, unstructured data sources using role-based security. Data lakes could contain customer data that cyber criminals can use to perform identity and bank theft, impacting hundreds of millions of people. In addition, confidential business information and intellectual property can be at risk.

It is critical to realize that no single organization has all the answers. Businesses should partner with solutions providers and other organizations that have faced the same big data security challenges.

For example, companies have partnered with other organizations to both secure their growing big data platforms and enable digital transformation. There are service providers that can categorize the data moving into enterprise data lakes and identify appropriate security controls. Other providers can assist with encrypting data in transit and at-rest, as well as applying policy-based access controls, allowing employees access only to the data they need to do their jobs.

Going forward, organizations must find creative ways to identify those who access their databases, systems, and networks in order to safeguard these vital assets. Therefore, we need to invest in the next wave of identity access management solutions, such as continuous authentication.

Continuous authentication uses a person’s behavioral or biometric characteristics to periodically re-authenticate users. For example, organizations can use keystroke-based pattern identification to quickly detect if an imposter is at the keyboard, lock the user account, and then trigger an alarm to security operations to take appropriate action. In addition, all of today’s laptops and mobile devices are equipped with a camera. Facial recognition technology can be used to continuously verify that the person looking at the screen is the expected user.

While beneficial to organizations, continuous authentication can lead to privacy, notification, and security issues that must be considered. Many employees have concerns over “big brother” watching them. One possibility is to strategically select which users and systems require continuous authentication, and only deploy such solutions for those identified as high risk. Employers can then make it clear that a higher level of monitoring is a job requirement. In addition, continuous authentication may capture personally identifiable information and, as a result, will be subject to privacy laws. Finally, before these solutions are widely deployed, businesses must address security requirements. We must ensure that malicious actors cannot hijack this technology. We must collaborate across the public and private sectors to resolve all these issues.

Big data and analytics continue to dramatically improve business operations and the customer experience. However, your organization will only realize these benefits if you are willing to invest in security. And we must have a broader societal conversation about the appropriate balance between security and privacy. At the end of the day, organizations still need to focus on security basics and get that right. This includes increased security awareness training and vulnerability management. Otherwise, your organization could become the victim of the next major data breach.

KEYWORDS: analytics cyber security data security Internet of Things

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill bradley 2017

Bill Bradley is Senior Vice President, Cyber Engineering and Technology Services for CenturyLink. He has more than 32 years of experience in cyber security and information technology with roles ranging from software developer to CTO and CIO. He leads a global workforce to ensure the company is protected and that its cyber technology services customers receive support from a trusted partner with deep technical experience. For more information, contact Bill Bradley via LinkedIn. Or, visit: http://www.centurylink.com/business/enterprise/it-security.html.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

Popular Stories

Black and smudged image of America

Political Violence in America: Turning Point or Flashpoint?

Airplane on runway

Cyberattack Disrupts European Airports, Security Leaders Respond

Person on laptop

Russian Threat Group Targets Microsoft Outlook With Malware

Simon Morgan Podcast header

How AI and Virtual Operators Are Transforming Security Operations

Laptop with money

Scattered Spider Targets Financial Sector After Alleged Retirement

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

October 8, 2025

How to Support the Security Guard Force in Challenging Environments

In this webinar, Brian Howell, Vice President, Global Head of Security at ADM, shares how his organization fosters trust among their security guard force to improve security posture and the safety of sites, processes and the officers themselves.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Steve Van Till

    Changing Security with Big Data, the Internet of Things and Social Media

    See More
  • Big Data

    How Will Big Data Change Security?

    See More
  • Big data

    How Leveraging Big Data Changes the Perception of Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing