Big Data

The problem with Big Data

The problem with Big Data

Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.

Back to basics - Ensure both PCI compliance and tighter security

Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.

2014 Big Data ebook

2014 Big Data ebook

By

In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.

IBM leverages Big Data in $325M DOE deal

By

The funding will support the development of two new supercomputers.

Securonix taps former BofA exec for chief scientist role

By

Igor Baikalov was appointed chief scientist at security intelligence firm Securonix.

How to effectively use segmentation to protect your datacenter from cyberattacks

Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.

Addressing attacks on critical infrastructure

Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.

Mitigating employee risk - Keep hires from starting fires

Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data.

Go big or go home

Go big or go home

By

Big Data is altering the way organizations must manage their overall IT assets and resources, reports Karen Epper Hoffman.

Data archiving benefits

Data archiving benefits

Many CIOs are still unsure what role governance should play in their data archiving strategy.

RSA 2014: Sharing data key to beating APTs

Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.

Debate: Big Data for security analytics is ready for prime time.

By

In this month's debate, experts discuss the importance of Big Data analytics in the industry today.

Big Data experts are in demand

Big Data experts are in demand

As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data is destined to become our industry's greatest challenge.

Protecting the data about data

Protecting the data about data

It has been said that encryption simply trades one secret (the data) for another (the key). In the same way, encrypting data naturally shifts attention to that which is not protected: the metadata.

Big Data and security analytics collide

Big Data and security analytics collide

Big Data will become "The next big thing" - a critical re-evaluation and re-tooling of our analytical abilities. This is not about being able to query more data, but being able to query all data.

Appreciate your log data

Appreciate your log data

By mining log data and managing it proactively - instead of ignoring it until something goes wrong - organizations can mitigate risk, ensure service availability and promote operational efficiency.

Horse trading 2.0: Information is a valued commodity

Horse trading 2.0: Information is a valued commodity

By

The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.

Securing the borderless enterprise: The role of IAM

Securing the borderless enterprise: The role of IAM

Cloud, mobile and security as a service (SaaS) platforms have become the new normal, and paired with the explosion in digital identities, these forces have made the traditional perimeter all but disappear.

RSA 2013: No need to wait for information sharing when Big Data-driven security is here now

By

RSA's Art Coviello said Big Data will give practitioners the comprehensive picture they need to detect advanced threats.

Big Data can fight malware

Big Data can fight malware

The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.

The case for integrating security silos

The case for integrating security silos

In this era of Big Data, it's antiquated that very rarely, if ever, are network administrators able to holistically view all the data generated by the various security solutions on their infrastructure.

Questions for CxOs in a new era

Questions for CxOs in a new era

As network security grows more elusive, CxOs need to ask their IT departments some tough questions.

EMC, RSA buy online fraud technology maker

By

EMC has acquired Menlo Park, Calif.-based online fraud detection provider Silver Tail Systems. Silver Tail, which offers "real-time web session and behavioral analysis" for banking, e-commerce and government customers, will operate as part of RSA, EMC's security division.

The IT staff of the future will speak business, not just technology

The IT staff of the future will speak business, not just technology

With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.

Big Data requires new skills

Big Data requires new skills

Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.

Big Data: The big picture

Big Data: The big picture

By

With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.

BlueCross fine over breach related to HIPAA notification rule

By

The BlueCross BlueShield settlement with the Office for Civil Rights is a reminder for health care organizations to bolster their data security, experts said.

Sponsored Video: Tom Reilly of HP on big data

By

Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US