Context is key: the data challenge of cybersecurity

One of the biggest challenges within cybersecurity is how to handle the sheer amount of data. Everyone in the field is familiar with the stories of failed SIEM implementations, because the number of false positives is simply too big for the available IT staff to have enough time and manpower to separate the useful from the useless.

How a fitness app became a matter of international security

By combining the Polar Flow data with social media profiles and other public information, Dutch journalists, together with the Bellingcat network for citizen journalism, were able to find names, addresses and photos of no less than 6460 individuals.