{"id":999,"date":"2014-08-26T00:00:00","date_gmt":"2014-08-26T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2014\/08\/26\/newsalert-august-25-2014\/"},"modified":"2021-12-30T11:38:33","modified_gmt":"2021-12-30T11:38:33","slug":"newsalert-august-25-2014","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2014\/08\/26\/newsalert-august-25-2014\/","title":{"rendered":"Newsalert &#8211; August 25, 2014"},"content":{"rendered":"<p>Traditional Log Management Is Dead. Long Live Autonomic Analytics! (25 Aug 2014 05:46 GMT)<br \/>\n\u2026 technical resources or organizational size. Log management technologies need to move beyond \u2026 of log management because the inherent complexity is hidden by the log management infrastructure \u2026 working smarter, as should your log management and analytics service. (Note: Opinions \u2026<br \/>\nLink: http:\/\/java.dzone.com\/articles\/traditional-log-management<\/p>\n<p>Getting ahead on security (24 Aug 2014 17:08 GMT)<br \/>\n\u2026 small aspect of detection or incident response. In addition, traditional focus \u2026 DNS security and DDoS protection, network firewall, access management, and application security with intelligent traffic management.\u201d So are there security technologies \u2026<br \/>\nLink: http:\/\/www.itp.net\/599307-getting-ahead-on-security<\/p>\n<p>Cybersecurity&#8217;s hiring crisis: A troubling trajectory<br \/>\nThere is a severe &#8212; and worsening &#8212; shortage of information security professionals. Leading industry experts believe it predicts a grave outcome.<br \/>\nLink: http:\/\/www.zdnet.com\/cybersecuritys-hiring-crisis-a-troubling-trajectory-7000032923\/?s_cid=e539&#038;ttag=e539&#038;ftag=TRE17cfd61<\/p>\n<p>Banks to meet with Treasury Department on cyber threats &#8211; sources<br \/>\n(Reuters) &#8211; A group of Wall Street banks plan to meet the U.S. Treasury Department and other government officials next month to talk about how to cooperate to fend off cyber attacks, people familiar with the matter told Reuters. Bankers and government officials say they want to figure out ways law enforcement can alert financial firms about cyber attacks without violating the privacy of businesses that are victimized. Both sides have long complained that such concerns have hindered notification, preventing the industry from quickly adapting to emerging threats.<br \/>\nLink: http:\/\/uk.reuters.com\/article\/2014\/08\/25\/uk-banks-cybersecurity-idUKKBN0GP17V20140825<\/p>\n<p>Market watchdog warns on danger of cyberattack<br \/>\nsounded the alarm about the growing danger of cyber attacks, on financial markets, warning that firms and regulators around the world need to address the &#8220;uneven&#8221; response to the threat of online assaults. He warned that there needed to be a more concerted effort to tackle cyber threats around the world as current approaches varied widely. &#8220;The feedback we have had from industry in discussions is that there is not a consistency in approach,&#8221; he said.<br \/>\nLink: http:\/\/www.cnbc.com\/id\/101943276<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional Log Management Is Dead. Long Live Autonomic Analytics! (25 Aug 2014 05:46 GMT) \u2026 technical resources or organizational size. Log management technologies need to move beyond \u2026 of log management because the inherent complexity is hidden by the log management infrastructure \u2026 working smarter, as should your log management&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-999","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=999"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/999\/revisions"}],"predecessor-version":[{"id":3486,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/999\/revisions\/3486"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}