Let the data do the talking

March 14, 2024



Security Journal UK look at the ways in which data driven technologies are being used to deliver a safer, more secure world. 

Behavioural analytics refers to the method of tracking user behaviour of a digital product to monitor and analyse behaviour, network traffic and system activities to identify deviations from normal patterns that indicate potential security incidents or insider threats.  

Security information and event management (SIEM) is a set of tools and services that combine security events management and security information management capabilities to aggregate and correlate data from various sources such as logs, network traffic, and security events to provide centralised monitoring, detection, and response capabilities.  

Machine Learning (ML) and Artificial Intelligence (AI) Systems analyse vast amounts of data to detect patterns, anomalies, and potential threats in real-time, aiding in threat detection, fraud prevention, and risk assessment. 

A subset of machine learning, deep learning algorithms are capable of processing large amounts of data and identifying complex patterns, which can be applied to tasks such as image recognition, malware detection, and natural language processing in security applications.  

These technologies, when integrated effectively, can significantly enhance an organisation’s security posture by providing insights, automation, and rapid response capabilities based on data-driven analysis.  

Despite the obvious benefits of data driven technologies in security and beyond, recent analysis of the market by McKinsey found, “only a fraction of data from connected devices is ingested, processed, queried, and analysed in real time due to the limits of legacy technology structures, the challenges of adopting more modern architectural elements, and the high computational demands of intensive, real-time processing jobs. Companies often must choose between speed and computational intensity, which can delay more sophisticated analyses and inhibit the implementation of real-time use cases.” 

Be careful 

Amid the myriad benefits of data-driven technology in security, ethical considerations and privacy concerns loom large.

As organisations amass vast amounts of sensitive data to power their security initiatives, ensuring robust data governance and compliance measures becomes imperative.

Striking a balance between security imperatives and individual privacy rights is essential to foster trust and uphold ethical standards in the deployment of data-driven security solutions. 

Martin McGrath, Sales Manager UK & Ireland, Milestone Systems explains, “Advances in AI and data collection within video cameras and VMS (video management software) make it more attractive to hackers.

“Simultaneously, building trust in AI-powered video is core to its future progress.

“As such, partnering with a trusted vendor who puts cybersecurity at the core of its practices is essential to your overall video cybersecurity and responsible use of video.  

Milestone Systems is one of the first companies to adopt and implement the G7 Code of Conduct for advanced Artificial Intelligence (AI) systems.

“The G7 Code of Conduct aims to promote safe, secure, and trustworthy AI worldwide.

“We are taking significant steps to address potential weaknesses of our tools.

“By signing up to the G7 Code of Conduct, Milestone will continue to focus its efforts on building software with trust, transparency, and accountability always front of mind. 

“We have also partnered with the Common Vulnerability and Exposures (CVE) Program as a CVE Numbering Authority (CNA).

“It means that Milestone will publish mitigated vulnerabilities to the wider community, to enhance knowledge sharing and cyber protection across the sector and maintain trust in its market-leading XProtect VMS.” 

In conclusion, the integration of data-driven technology marks a paradigm shift in the realm of security, offering unprecedented capabilities to pre-empt, detect, and mitigate threats in an increasingly complex threat landscape.

By harnessing the power of predictive analytics, real-time threat detection, and AI-driven intelligence, organisations can bolster their defences and safeguard against emerging risks.

However, vigilance in addressing ethical considerations and privacy concerns remains paramount to ensure the responsible and ethical deployment of data-driven security solutions in the pursuit of a safer, more secure world.

This article was originally published in the March Edition of Security Journal United Kingdom. To read your FREE digital edition, click here.

Read Next

Security Journal UK

Subscribe Now

£99.99 for each year
No payment items has been selected yet