In this contributed article, Alexander Norell of VikingCloud explores how big data analytics can significantly improve cybersecurity strategies by enabling more accurate threat detection and real-time response capabilities.
Surviving the Big Data Underworld: Establishing and Safeguarding Data Sovereignty
In this contributed article, editorial consultant Jelani Harper discusses how prudently coupling data backups with timely restoration options, organizations can preserve data sovereignty for unassailable business continuity during times in which it’s needed most.
5 Big Data Vulnerabilities You Could Be Overlooking
In this contributed article, technology writer and blogger Kayla Matthews offers 5 Big Data vulnerabilities you could be overlooking. This article answers: What vulnerabilities exist? What could you be missing? How can you protect your organization, your network and your data?
5 Tips to Overcome Big Data Security Issues
In this contributed article, freelance technology journalist Josh McAllister provides five tips that can help you guard data against breaches in both big data deployments and any software accessing the data.
Dataguise Delivers Strong Level of Support for GDPR Right of Access and Erasure Requirements with Enhanced Product Suite
Dataguise, a leader in data-centric audit and protection (DCAP) software, announced support for General Data Protection Requirement (GDPR) Article 17 (Right to Erasure or Right to be Forgotten) and Article 15 (Right of Access by the Data Subject) in the company’s next generation DCAP software suite. The latest version of the machine learning powered solution is compatible with all popular enterprise and cloud data store environments and widely deployed by the Global 2000 in support of GDPR requirements.
Do Security Professionals Really Need Big Data?
In this contributed article, tech writer Linda Gimmeson discusses two basic approaches to securing big data: staying small and strategic, or leveraging big data for a broader approach. Either approach can be successful, but it is up to the organization and security professionals to strategically decide how much big data they actually need.
Thales: 63% of Enterprises Using Cloud, Big Data, IoT and Container Environments without Securing Sensitive Data
Thales, a leader in critical information systems, cybersecurity and data security, announced the results of its 2017 Thales Data Threat Report, Advanced Technology Edition, issued in conjunction with analyst firm 451 Research. According to the report, 93 percent of respondents will use sensitive data in an advanced technology (defined as cloud, SaaS, big data, IoT and container) environments this year.
Taking the Five Second Rule Beyond the Dinner Table to Prevent Cyber Attacks
In this contributed, Eric Tran-le, Global Chief Marketing Officer at Logtrust Inc., discusses how big data analytics is being used to fight fraud across a number of different industries facing the same data problems.
Dataguise Strengthens Sensitive Data Governance in the Cloud with Support for Google Cloud Storage
Dataguise, a leader in sensitive data governance, announced that DgSecure Detect now supports sensitive data detection on Google Cloud Storage (GCS). Integration with GCS extends the range of platforms supported by DgSecure Detect, which helps data-driven enterprises move to the cloud with confidence by providing precise sensitive data detection across the enterprise, both on premises and in the cloud.
Big Data, Big Challenges – Keeping Your Information Safe
In this contributed article, Sheza Gary, a technical director at Algoworks, highlights the importance of properly security enterprise data assets by offering three main points of difference between protecting big data and traditional amounts of data.