Register | Help


106 publications found:

Faster Big Data is Needed for Digital Business and Security Analytics   (2016-03-29)
Nine Main Challenges in Big Data Security   (2016-01-19)
Big Data Unlocks Valuable Information Across Organizations—But Only If You Can Protect It   (2015-12-08)
Securing big data, a cross-technology challenge infoworld.com   (2015-11-11)
Be the Power Behind the Throne: Create a Secure Environment for Big Data: https://securityintelligence.com/be-the-power-behind-the-throne-create-a-secure-environment-for-big-data/   (2015-10-23)
GE Reports: Big data demands big security   (2015-10-23)
How to hack Hadoop (and how to prevent others doing it to you)   (2015-10-20)
New technology or analytics tools may open routes to re-personalise anonymous data   (2015-10-13)
PHEMI locks down bigdata with Zero-Trust tech   (2015-09-29)
Are cloud-based data warehousing and business analytics worth the risk?   (2015-09-23)
Managing Big Data Integration and Security with Hadoop   (2015-09-03)
Do not let fear kill the promise of Big Data   (2015-09-02)
Why understanding the lifecycle of a cyber attack is better than trying to stop it   (2015-08-28)
IoT – The new security headache for the enterprise IT department?   (2015-08-25)
Interview: Big data and the importance of identity   (2015-08-21)
Big Data Systems House Sensitive Data, Security Exposures   (2015-06-12)
Big Data: Protecting Privacy Is Good For Business   (2015-05-12)
As the world of Big Data grows, so do security concerns   (2015-05-11)
Everything You Need to Know About Big Data as a Service   (2015-05-07)
Cisco Services chief talks about the network provider’s big data plans   (2015-05-01)
Big Data Governance: Big Data Quality   (2015-04-30)
Big Data & The Security Skills Shortage   (2015-04-29)
Companies Must Not Overlook Big Data Security Needs   (2015-04-20)
The power of data in the financial services industry   (2015-04-13)
Hadoop security: Don't build your data lake without it   (2015-02-17)

Page 1 2 3 4 5 >


Security Protect Ransomware Attacks Data Cloud ISSA pandemic privacy encryption tokenization hipaa QA SA Quality Assurance Security Assurance Waterfall AppDev Agile Development DataOps DevOps Compliance NIST PCI DSS Data. Privacy GDPR CCPA Machine Learning AI PII PI Data Discovery SC Magazine BigID Discovery Trustwave FFIEC WInfosecurity ISACA dataops nist standards rsac RSAC 2020 coronavirus blockchain bitcoin databases breaches PCI HITECH RSA • Breaches cyber attack cyber security cyber threat data breach data protection data security BlindSpots NYC Oracle NYOUG siem linkedin blind spots ulf mattsson DSS CSA Gartner Ponemon IBM verizon big data IoT Business Alanta hadoop masking Protection Strategy pci. hipaa regulations Healthcare tokenzation masking Trends Data Protection Strategy brighttal FS-ISAC monitoring audit Cybersecurity ulfmattsson privace cio ciso Data-Centric Digital Business New York City Analytics risk attack breach Justice Department Charges Iranian Hackers Cyberattack Dam power grid C-suite itproportal crime Execs Software Silicon Valley greenwichtime
Showing 50 most recent tags.
View all