Brou Marie Joelle Alexandra Adje

  • Did you know that SPLUNK had a security issue that could be exploited by an attacker ?

    Well, the bug leaks the username, and if that user has enabled remote access. This allows an attacker to target the user […]

  • Thanks for sharing James. I heard about Hadoop before as well. One of the downsides is that it is one such platform wherein only large business that generates big data can utilize its functions. It cannot efficiently perform in small data environments. It also lack preventive measures, like fo example the security measures are always disabled by…[Read more]

  • Great post David. It really make sense because when you think about it algorithms can make systems smarter, but without adding a little common sense into the equation they can still produce some pretty bizarre results. That’s why human intelligence is also necessary. Combining human analysis and machine data mining will allow to obtain credible…[Read more]

  • Hey David, I actually read that article and really liked the concept of behavioral technologies. Like, old systems don’t discover identity theft by authorized users. People dont usually think about these things but they can make a difference, especially in the cyber world. Behavioral technologies are based on behavior analysis, which is pretty…[Read more]

  • The big data refinery (step 2 on image) is a new system capable of storing, aggregating and transforming a wide range of multi-structured raw data sources into usable formats that help fuel new insights for […]

  • I read an article related to the biggest cybersecurity being inside companies. In other words, no matter the size or the scope of a breach, usually it’s caused by an action, or failure, of someone inside the co […]

    • Brou,

      I agree with your assessment that the biggest IT risk comes from inside the company (or their vendors). Companies should analyze the behaviors of their employees. If everyone normally leaves at 5, but then all of the sudden one employee decides to start staying late all of the time, that can be an indicator that the employee is committing fraud. It may not always be the case, but it looks like they could be trying to hide something by working when others are not around. Employers should be able to recognize when an employee is not acting as they normally do. I think the same can be said for vendors too. If they suddenly start working on the system at different hours than normal, the perhaps they are committing a fraud as well.

  • No one wants to be overtaken by events. Businesses must adapt to changes in order proactively shape the future before it’s too late. Data analytics is a key enabler for continuous, proactive adaptation to c […]

  • When it comes to decreasing the risk of data loss, data backups is crucial for companies to be able to resume operations as fast as possible following an incident or disaster. Thus, it is also crucial to know how […]

    • I agree that companies need to regularly back up their data. However, I think that for a lot of small companies, backing up everyday may be too costly or too time consuming. These companies should preform an impact analysis to determine which data needs to be backup daily, and what can be done at less frequent intervals. This should help ease the time constraints and financial burden of backing up everything every day.

    • Thank you for this informative post Alex,

      You mentioned a very critical issue. Companies that do not have adequate backup might have high business risks. Companies’ business successes need continuity that relies on data and other business applications. It doesn’t mean that they have to back up their every data in every time. At this point I agree with Blake. Data backup plan should be performed based on business impact analysis. According to the importance level of data, the frequencies (day to day, medium term, long term) and backup types (on-site backup, cloud backup) should be determined.

  • Brou Marie Joelle Alexandra Adje posted a new activity comment 2 months ago

    Good point Priya, I like that you mentioned that “As an IT auditor it is important that you evolve as the industry is evolving”. Indeed, the great thing about being an auditor is that you are constantly learning. Every audit provides new situations and challenges. Legislation and regulations change too. There is no way a faker can be trusted. I…[Read more]

  • Laly, would you be ok with an auditor who has no idea about what he/she is doing? i mean what’s worse? one who is ignorant and refuses to learn or one who knows things but is just lazy, need a little push? I think lazy auditors are still good at observation and inquiry. They are still able to provide sound audit recommendations. the downside is…[Read more]

  • I agree with you Yu ming, the faker is incompetent in certain area and mask the incompetence with lying instead of building their skills. Auditors are risk, compliance, and process experts, but not necessarily experts in everything their clients do. When faced with complex situations, the faker will attempt to “fake it” instead of learning the…[Read more]

  • Yu Ming, when it comes to fast data, it is important to capture the value in it properly. In fact, the best way to capture the value of incoming data is to react to it the instant it arrives. If businesses are processing incoming data in batches, they’ve already lost time and, thus, the value of that data. To process data arriving at tens of…[Read more]

  • Indeed Binu, SIEM tools are not enough anymore. They are only good at detecting anomalies, such as 10+ failed login authentications, or the network IPs generating the highest firewall traffic. The challenge lies in differentiating anomalies from true malicious behavior, whether it be an attacker masking as an internal employee or an insider…[Read more]

  • Deepali, did you know that one of the first users who used Big Data and microtargeting was Obama’s election team in the 2012 United States Presidential campaign? They used microtargeting to interact and appeal to voters individually. Following Khawlah’s example, we can agree that nowadays, microtargeting techniques are becoming an essential tool f…[Read more]

  • right Khawlah, although dark data holds massive amount of potential for those who want to harness its immense power, it can also pose dark threats. Indeed, as you mentioned dark data can cause legal, financial and other problems if it is not handled well enough. If data covered by mandate or regulation – such as confidential, financial i…[Read more]

  • Nicely said Priya, I really like that you mentioned that every breach is a learning. Indeed, the least companies can do is to learn lessons from incidents to help ensure the same thing doesn’t happen again. Additionally, it is really important to detect breaches early in the process to minimize losses. I believe businesses must build a system t…[Read more]

  • Doing researches for job interviews, I came across Deloitte Consulting’s eighth annual report on the state of technology. In this report, Deloitte cited seven emerging technologies as critical to the future of I […]

    • Good points, Alex. These are really critical technologies for any organization, and the most important one, in my opinion, is the first point which is Dark analytics. The importance of dark analytics can be summarized in tow points. First, Dark data represents a huge opportunity for companies to gain valuable insights which can drive their business, so companies may loss these opportunities by not tapping into dark data. Second, Dark data can cause legal, financial and other problems if it is not handled well enough.

      • right Khawlah, although dark data holds massive amount of potential for those who want to harness its immense power, it can also pose dark threats. Indeed, as you mentioned dark data can cause legal, financial and other problems if it is not handled well enough. If data covered by mandate or regulation – such as confidential, financial information (credit card or other account data) or patient records – appears anywhere in dark data collections, its exposure could involve legal and financial liability

  • I have always wondered why so many data breaches continue to occur without people knowing in advance after so many year of researches.

    “Do you think hackers are excessively smart or are businesses not f […]

    • What makes it really strange that sometime people use very simple ways to do the fraud!.
      I think the most powerful way to prevent data breaches is by the awareness programs and policy enforcement.

      Thanks Alex,

    • All good, sound measures for mitigating the risk of fraud. Ultimately, c-level executives will be tasked with factoring in the strategic objectives of the company and how fraud impacts them. A thorough risk assessment should determine a company’s risk tolerance. Then the challenge is to invest the proper amount of money to reduce or eliminate loss from the fraud.

  • Following the introduction to myself, I want to share thoughts about data analytics and why it is crucial in any organization nowadays.

    First, data analytics refers to the process of “examining data sets to dra […]

    • Good post Alex, I totally agree with your statement that “companies should not see data as the responsibility of IT only.” Data itself means nothing before data becomes information after it has been processed to add context, relevance and purpose in business. The ability to analyze and act on data is increasingly important to businesses.

    • Absolutely, data is the most valuable asset for any organization. Meanwhile, it’s something needs an efficient collecting and analysis to drive the actual value. If enterprises make an effort on their big data, that will help to increase their profits and create a competitive advantage for them.

  • My name Is Brou Marie Joelle Alexandra Adje, but I go by Alex to make it easier. I’m originally from Ivory Coast, West Africa. I graduated from temple in May 2015 with a BA in Risk Management and Insurance. I w […]

  • Load More
Skip to toolbar