Big Data

RadioShack, state coalition reach terms on sale of customer data

By

RadioShack and a coalition of 38 states have reached an agreement allowing RadioShack to sell the customer data under certain conditions.

FTC recommends conditions for sale of RadioShack consumer information

FTC recommends conditions for sale of RadioShack consumer information

By

The FTC has recommended a list of conditions that a bankruptcy court should impose on the sale of RadioShack's information assets.

Building a sophisticated endpoint defense strategy with full security lifecycle protection

Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns

Gib Sorebo used his session at RSA to discuss the Internet of Things (IoT) and its possible repercussions.

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

RSA 2015: Intel SVP looks to Moneyball story to inspire offensive strategies

By

At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.

Permira, CPPIB to acquire Informatica

By

Data software company Informatica announced, on Tuesday, that it is set to be acquired by private equity firm Permira and Canada Pension Plan Investment Board (CPPIB).

IBM will invest $3 billion in new IoT unit

IBM will invest $3 billion in new IoT unit

By

IBM will investing $3 billion over the next four years to establish a new Internet of Things (IoT) business unit along with a cloud-based platform to help build IoT solutions.

Cracking the confusion between encryption and tokenization

Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn't always an easy decision.

How Provident Bank transformed their information protection strategy

A single click by your end users can lead either to a data breach or to data protection. Which would your organization prefer?

Canada losing cybersecurity war

By

Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.

Samsung updates Smart TV privacy policy to clarify collection of user data

Samsung updates Smart TV privacy policy to clarify collection of user data

By

After device owners and media outlets began questioning Samsung's vague privacy policy related to its Smart TVs, the company revised the policy to further clarify.

From Big Data to smart data for security analytics

From Big Data to smart data for security analytics

Real security analytics demands a practitioner who has direct field knowledge of computer security, proving once again that human talent is indispensable. Problem is, human talent doesn't scale.

Understanding web bots and how they hurt your organization

The internet is literally crawling with bots. Millions of them scour the farthest reaches of the internet every day, indexing content, testing connections, and making the web more useful overall.

The problem with Big Data

The problem with Big Data

Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.

Back to basics - Ensure both PCI compliance and tighter security

Every business that operates a cardholder environment to transact with its customers is required to maintain compliance to the PCI DSS international standard for security. Penalties for lack of compliance have become costly yet compliance does not equal security.

2014 Big Data ebook

2014 Big Data ebook

By

In this new ebook we speak with a range of experts to glean their insights on the technologies and strategies they are putting in place to guard their treasure troves and prevent both insider incidents and attacks from the outside.

IBM leverages Big Data in $325M DOE deal

By

The funding will support the development of two new supercomputers.

Securonix taps former BofA exec for chief scientist role

By

Igor Baikalov was appointed chief scientist at security intelligence firm Securonix.

How to effectively use segmentation to protect your datacenter from cyberattacks

Critical datacenter assets are at the heart of financial services (and many other industries) enterprise networks. Unfortunately, it's still too easy for attackers to get into the datacenter through an insider, a partner, a side server, virtualization, or even a development environment.

Addressing attacks on critical infrastructure

Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.

Data security and privacy: Key issues, challenges and responses

Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.

Mitigating employee risk - Keep hires from starting fires

Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data.

Go big or go home

Go big or go home

By

Big Data is altering the way organizations must manage their overall IT assets and resources, reports Karen Epper Hoffman.

Data archiving benefits

Data archiving benefits

Many CIOs are still unsure what role governance should play in their data archiving strategy.

RSA 2014: Sharing data key to beating APTs

Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.

Debate: Big Data for security analytics is ready for prime time.

By

In this month's debate, experts discuss the importance of Big Data analytics in the industry today.

Big Data experts are in demand

Big Data experts are in demand

As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data is destined to become our industry's greatest challenge.

Protecting the data about data

Protecting the data about data

It has been said that encryption simply trades one secret (the data) for another (the key). In the same way, encrypting data naturally shifts attention to that which is not protected: the metadata.

Big Data and security analytics collide

Big Data and security analytics collide

Big Data will become "The next big thing" - a critical re-evaluation and re-tooling of our analytical abilities. This is not about being able to query more data, but being able to query all data.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US