{"id":226,"date":"2013-03-18T00:00:00","date_gmt":"2013-03-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/18\/security-think-tank-context-aware-security-saves-time\/"},"modified":"2021-12-30T11:36:47","modified_gmt":"2021-12-30T11:36:47","slug":"security-think-tank-context-aware-security-saves-time","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/18\/security-think-tank-context-aware-security-saves-time\/","title":{"rendered":"Security Think Tank: Context-aware security saves time"},"content":{"rendered":"<p>Context-aware computing is not a new idea; everything from the search engine you are probably sitting in front of to the mobile phone in your pocket uses it at its most basic level. The origin of the phrase comes from the human idea of studying a piece of text and bringing to bear the other things that you know about the words on paper; from the author\u2019s life story to the facts about its setting. In fact, security teams are overworked generally and even very large companies are seeking to outsource some elements of the process. By embracing context-aware security devices, operational savings can be made through a reduction in response times and an increased likelihood of the correct decision being made during an incident.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identify areas of intensive data analysis and look for strategic alignments with context-aware devices that can increase reaction times without reducing effectiveness<\/p>\n<p>Thinking back to the origin of the phrase contextual computing, it is important also that these actions be put into the most appropriate human context.   It should be a specialist security team or officer running these processes and they need to be made in context \u2013 while thinking holistically about the overall needs of the business.<\/p>\n<p>It may well be that more security technology, context-aware or not, is not the biggest requirement for some companies.<\/p>\n<p>Sometimes it is the human context that needs to be improved, from a social-engineering perspective.   After all, the supplemental information the software will be looking for is founded on human behavior patterns, from information user behavior and tasks to location, infrastructure and physical conditions. <\/p>\n<p>Link: http:\/\/www.computerweekly.com\/opinion\/Security-Think-Tank-Context-aware-security-saves-time?utm_medium=EM&#038;asrc=EM_ERU_20999938&#038;utm_campaign=20130318_ERU%20Transmission%20for%2003\/18\/2013%20(UserUniverse:%20635390)_myka-reports@techtarget.com&#038;utm_source=ERU&#038;src=5114873<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-226","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"predecessor-version":[{"id":2713,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/226\/revisions\/2713"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}