ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.By Lisa Brownlee
Every so often a buzzword or phrase in information security discourse surfaces from the infosec jargon din into broader public consciousness. One such buzz phrase is “pattern of life” analytics (POL). POL, to vastly simplify the definition, is a computerized data collection and analysis method used to establish a subject’s past behavior, determine its current behavior, and predict its future behavior. The number and type of data points that go into this analysis, particularly as it pertains to humans as the subject, have been increasing exponentially […]