Derek Lin

Biography

  • Security Analytics in Action: Use Cases for Deep Monitoring of Privileged Users

    Security Analytics in Action: Use Cases for Deep Monitoring of Privileged Users

    Pivotal data science and security expert, Derek Lin, has considerable experience in the areas of big data, software development, and analysis for security, risk, fraud, and online banking. In this...

    Read More
  • A Data Science Approach to Detecting Insider Security Threats

    A Data Science Approach to Detecting Insider Security Threats

    In my conversations with CISOs, one of their biggest fears is insider threat attack. Employees must access internal information freely to be productive, yet ill-intentioned information access must...

    Read More
  • Using Data Science Techniques for the Automatic Clustering of IT Alerts

    Using Data Science Techniques for the Automatic Clustering of IT Alerts

    Large enterprise IT infrastructure technology components generate large volumes of alert messages. Instead of time-consuming manual screening, these alerts can be automatically clustered using...

    Read More
  • Examples of How Data Science Enables a New Way of Thinking for Corporate IT

    Examples of How Data Science Enables a New Way of Thinking for Corporate IT

    No longer merely the unexciting but essential back door plumbing of an enterprise, IT will increasingly take a front and center role in company strategy. Businesses with better and innovative...

    Read More
  • Demystifying Data Science for Network Security

    Demystifying Data Science for Network Security

    What does Pivotal add over existing commercial solutions for network security? The use of data science that provides the new ability to proactively and automatically discover adversarial events...

    Read More
  • Big Data Analytics for Network Security Monitoring

    Big Data Analytics for Network Security Monitoring

    After years of enterprise security breaches, one would think companies have learned much and are improving their security posture. In reality, the bad guys continue to have the upper hand in this...

    Read More
  • loading
    Loading More...