

Starting this Saturday, Black Hat USA 2013 will be convening at Caesar’s Palace in Las Vegas. Over the last week, SiliconANGLE has been previewing just a handful of the sessions meant to deal with issues pertaining to Big Data and data storage and management. Here we provide a recap of just some of the week’s offerings:
With the wide adoption of OLAP, a substantial portion of the presentation will be spent going into detail on each of the individual components associated with this technology, most especially the MDX request language.
While malware is regarded as a nuisance for both security providers and users alike, the presentation will highlight the opportunities presented by this incoming data, especially as it applies to machine learning. They will show how Endgame has performed static analysis on malware so they might extract specific feature sets used for performing large-scale machine learning.
Of course it is well known, from a data science perspective, the use of analytics presents significant advantages for an organization. What is less understood and less documented is how an organization can utilize analytics to their advantage in the area of web application security.
For Black Hat USA, Williams plans to demonstrate DropSmack v2, showing not only how it operates but also explaining how to deploy it within your own operational environment. As DropSmack is intended to point out vulnerabilities, Williams will also discuss some of the countermeasures that can be employed to mitigate attacks…
As the technology currently allows, there is a reliance on top security practitioners to stand, seemingly with their fingers in the dyke, against an ever increasing flood of data. Even with the advances in malware and targeted attacks detection technologies, Pinto claims, “[They] can only do so much in a 24-hour day; even less if you let them eat and sleep.”
To say Christey and Martin are unimpressed with such statistical analysis would be an understatement. They even go so far as to call them, “…faulty or just pure hogwash.” They attribute this to the use of data that, while easily available, is drastically misunderstood. From this footing, firms then go on, “…to craft irrelevant questions based on wild assumptions.”
SiliconANGLEs theCUBE will be broadcasting live from Black Hat USA 2013 next week. I urge you to join us to learn about the cutting edge of combating data and network vulnerabilities at siliconangle.tv
THANK YOU