E-mail:
Password:
Register | Help

Postings

78 publications found:

Eight Technologies and Their Impact on Your Business   (2016-08-02)
Data-centric security key to cloud and digital business   (2016-04-18)
Data-Centric Security - Cloud and Digital Business in New York City   (2016-04-15)
Faster Big Data is Needed for Digital Business and Security Analytics   (2016-03-29)
Happy Silver Anniversary RSA Conference!   (2016-02-25)
2016 Predictions: Security, devops, big data and mobile testing   (2016-01-20)
Nine Main Challenges in Big Data Security   (2016-01-19)
Big Data Unlocks Valuable Information Across Organizations—But Only If You Can Protect It   (2015-12-08)
Big Data and Healthcare - Leveraging medical claims data while safeguarding consumer privacy   (2015-12-08)
Securing big data, a cross-technology challenge infoworld.com   (2015-11-11)
Be the Power Behind the Throne: Create a Secure Environment for Big Data: https://securityintelligence.com/be-the-power-behind-the-throne-create-a-secure-environment-for-big-data/   (2015-10-23)
GE Reports: Big data demands big security   (2015-10-23)
How to hack Hadoop (and how to prevent others doing it to you)   (2015-10-20)
PHEMI locks down bigdata with Zero-Trust tech   (2015-09-29)
Managing Big Data Integration and Security with Hadoop   (2015-09-03)
Do not let fear kill the promise of Big Data   (2015-09-02)
Big hacks, big data add up to blackmailer's dream   (2015-09-01)
Why understanding the lifecycle of a cyber attack is better than trying to stop it   (2015-08-28)
IoT – The new security headache for the enterprise IT department?   (2015-08-25)
Interview: Big data and the importance of identity   (2015-08-21)
IoT Working Group Crafts Framework For Security, Privacy   (2015-08-12)
Internet of Things: What the security industry is doing to protect consumers using connected devices   (2015-08-11)
INSIGHT: Top 4 ways to secure the Internet of Things   (2015-08-11)
7 Lessons From The Internet of Things Frontier   (2015-08-07)
How the IoT Will Impact Enterprise IT Operations   (2015-08-05)

Page 1 2 3 4 >

Categories

Security Protect Ransomware Attacks Data Cloud ISSA pandemic privacy encryption tokenization hipaa QA SA Quality Assurance Security Assurance Waterfall AppDev Agile Development DataOps DevOps Compliance NIST PCI DSS Data. Privacy GDPR CCPA Machine Learning AI PII PI Data Discovery SC Magazine BigID Discovery Trustwave FFIEC WInfosecurity ISACA dataops nist standards rsac RSAC 2020 coronavirus blockchain bitcoin databases breaches PCI HITECH RSA • Breaches cyber attack cyber security cyber threat data breach data protection data security BlindSpots NYC Oracle NYOUG siem linkedin blind spots ulf mattsson DSS CSA Gartner Ponemon IBM verizon big data IoT Business Alanta hadoop masking Protection Strategy pci. hipaa regulations Healthcare tokenzation masking Trends Data Protection Strategy brighttal FS-ISAC monitoring audit Cybersecurity ulfmattsson privace cio ciso Data-Centric Digital Business New York City Analytics risk attack breach Justice Department Charges Iranian Hackers Cyberattack Dam power grid C-suite itproportal crime Execs Software Silicon Valley greenwichtime
Showing 50 most recent tags.
View all