Security Threat Analysis Via Twitter - Dataminr Profile

By Brian Karas, Published Apr 10, 2017, 04:24am EDT (Info+)

Increasingly, large enterprises are using Twitter's datastream as a source of threat intelligence.

While Twitter is filled with the noise of celebrity fashion trends, bot-spam and shameless marketing promos, it also regularly has people breaking news or sharing real time information about critical events. One company, Dataminr claims to be able to analyze Twitter's 'firehose', spotting emerging threats and other trends.

In this reportm we profile Dataminr and their Twitter analysis service, including how it can be used by those looking for a threat intelligence service.

Dataminr ********

***** ** *** ****, *** ******* in ****, ******** *** ****** ~$**** in ******* ******* ** "******* ***** **** ****** ***** *** clients ** *** ******* *** ********** sectors". ******** ** *** ** *** companies **** **** ****** ** *******'* 'firehose', *** **** ********** ** *** public ******, ***** **** ******* ***** algorithms *** ******* ********* ********** ** attempt ** ******* *** ********** ****** to **** ****** *** ******* **** their ******* **** ********.

******** ******* *** ********* ********* ************, municipalities, ***** ********** *******, *** **** organizations ******* *** ***** ************ ** emerging ******. *** ******* *** **** under **** ** ***** *** *** it (** *******) *** ********* ****** to *** *******, **** ** **** *** ***'* ****** *** *******.

*** ********* ***** ***** * ****-***** overview ** *** ******** ***** ****** about ** ********* **** ** *****:

Product ********

******** ******** * *********-***** *********. ***** can *** ******** ****** *** ****** relative ** ***** ******** ********, ********'* site ***** ****** **** ** ********* verticals, ********* ********* ******** [**** ** longer *********]. ************, ****** ***** *** be ******* ** *** ****** ** specific ******** ** ****** ** ********, along **** ********* *** **** ** when *** ***** ****** *** ***********:

Twitter-Centric **** ******

********* ** ********, ******* ** *** primary ****** ** ****** ***** *********** sharing, *** ******* *********** ****** ** other ******** ** ***** *****-****** ** Twitter ** ****. *** ******* **** up ** **% ** *** **** it ******** **** ******* ** ******** cross-posts ** *********** **** ***** *******. Whether ****** ********, ** *****-******, ****** information **** ** ** ******* **** Dataminr **** *** *** * *********** to ******* ******* ******** ** ***** services ** **** ****. 

*******

******* ****** ** ~$***/**. *** ** negotiated **** **** ******, ********* ********** by ** ************'* **** *** *******, *** by ******* **** ****** ** ***** or ******. ***** ************* ******* ** monitor ****** ******** ******* **** ********* pay $*,***+/**.

No ****** ******** ************

****** ** ****** ************ ** ******** platforms ***** ****** ********, ****** *** be ***** ** ** **** *** email ** ***** *****, ***** **** PSIM-style ********* *** *** ** ******* an *****. 

Compared ** **** ******* ************

******* *****, ** ****-**** *********, *** beginning ** *********** **** **** ******* or ***** ****** ***** ******** ******** into ***** *********. ***** ********* *** generally ************* ** ******* ****** ** a ***-******* ****, ** ********** ********** search *****, **** ****** ** ** focus ** "******" ******* *** ****-**** indications ** ****** ******, ***** ** one ** ********'* *** ***** ************. In ********, *** ** ********'* ****** to ******** **** "********" ****, *********** VMS/PSIM ************ *** *** **** ****** to *** *** ****** **** ******** does, ****** *** **** ******** ********** access **** ** ***** ******, ** those ** *** ***********, *** ** sufficient.

Security Use *****

* ******** ************ ***** ** **** beneficial ** ************* **** ****** ******** large *****, ** ** ****-**** *********. Assets ***** ** ****** ******* **** employees, ** ****** ******** ****** **** cell ******, ********** *********** ** *** wells. *** **** **** *****, ******** can ******* ****** ** ******** ******* in *** ****, **** ** ********* or ********* ********. ***** ********* ** these ****** *** **** ************* **** time ** ***** ** ****** ********* or ***** ********* ** *** **** to ********.

Comments (1)

I stopped by their booth at the show and was impressed with the breadth of their data mining - what I really didn't understand and failed to get an answer on was why they didn't syndicate the feeds. I asked if I could consume their content as a service and they didn't have that available. I think they would kill it if they would allow customers to pay for streams that could be embedded in some form of Restful or JSON stream that I could display as content in an active stream in a GSOC. I don't want (nor do I need) another website taking / distracting guards from their job of monitoring situations.  Great idea, poor implementation.

Agree: 1
Disagree
Informative
Unhelpful
Funny
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports