
ConnectConverge
Jan-Feb 2021
Jan-Feb 2022
Jan-Feb 2023
Jan-Feb 2024
Jan-Feb 2025
Jan-Feb 2020
July-August 2021
July-August 2022
July-August 2023
July-August 2024
July-August 2019
July-August 2020
March - April 2021
March - April 2022
March - April 2023
March-April 2024
March- April 2025
March-April 2020
May - June 2021
May - June 2022
May-June 2023
May - June 2024
May-June 2025
May-June 2019
May-June 2020
Nov-Dec 2020
Nov - Dec 2021
Nov-Dec 2022
Nov-Dec-2023
Nov - Dec 2024
Nov-Dec 2019
Sept - Oct 2021
Sept – Oct 2023
Sept - Oct 2024
Sept-Oct 2020
Sept-Oct 2019


Modernizing NonStop Development
abat+
Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection
Steve TcherchianIt can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.