Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.
Employees are an organization's greatest asset and greatest risk. With a single click an employee can devastate a business by transferring or damaging huge amounts of data.
Many CIOs are still unsure what role governance should play in their data archiving strategy.
Collaborative sharing of security data across enterprises, countries and industry sectors in a single big data store will be the future of protecting against advanced persistent threats, RSA delegates were told today.
In this month's debate, experts discuss the importance of Big Data analytics in the industry today.
As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data is destined to become our industry's greatest challenge.
It has been said that encryption simply trades one secret (the data) for another (the key). In the same way, encrypting data naturally shifts attention to that which is not protected: the metadata.
Big Data will become "The next big thing" - a critical re-evaluation and re-tooling of our analytical abilities. This is not about being able to query more data, but being able to query all data.
By mining log data and managing it proactively - instead of ignoring it until something goes wrong - organizations can mitigate risk, ensure service availability and promote operational efficiency.
The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.
Cloud, mobile and security as a service (SaaS) platforms have become the new normal, and paired with the explosion in digital identities, these forces have made the traditional perimeter all but disappear.
RSA's Art Coviello said Big Data will give practitioners the comprehensive picture they need to detect advanced threats.
The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.
In this era of Big Data, it's antiquated that very rarely, if ever, are network administrators able to holistically view all the data generated by the various security solutions on their infrastructure.
As network security grows more elusive, CxOs need to ask their IT departments some tough questions.
EMC has acquired Menlo Park, Calif.-based online fraud detection provider Silver Tail Systems. Silver Tail, which offers "real-time web session and behavioral analysis" for banking, e-commerce and government customers, will operate as part of RSA, EMC's security division.
The challenge that Big Data presents is trying to align disparate analytical islands. The answer comes in pulling all the pieces together.
With emerging technologies that must be controlled, the demand to align business risk with security is growing. As such, the IT role is being reinvented under our feet, and those who function more like a CIO will rule the world.
Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
The BlueCross BlueShield settlement with the Office for Civil Rights is a reminder for health care organizations to bolster their data security, experts said.
Tom Reilly, VP and general manager of HP Enterprise Security Products, discusses the issues facing the security industry today including targeted attacks, managing big data, and how bring-your-own-device also raises issues with mobile computing.
The ability by organizations to collect mountains of data offers a dream scenario for hackers, but if managed properly, large volumes of information also can present IT staff with unique and valuable insight into an organization's security posture.