E-mail:
Password:
Register
|
Help
   
Publications
Books
Postings
79 publications found:
How the Latest Trends in Data Security Can Help Your Data Protection Strategy
 
(2016-07-11)
Securing big data, a cross-technology challenge infoworld.com
 
(2015-11-11)
Be the Power Behind the Throne: Create a Secure Environment for Big Data: https://securityintelligence.com/be-the-power-behind-the-throne-create-a-secure-environment-for-big-data/
 
(2015-10-23)
How to hack Hadoop (and how to prevent others doing it to you)
 
(2015-10-20)
Managing Big Data Integration and Security with Hadoop
 
(2015-09-03)
6 Misconceptions of Big Data
 
(2015-08-05)
Xerox: How Privacy Engineering Is Changing Big Data
 
(2015-08-05)
Stolen Consumer Data Is a Smaller Problem Than It Seems
 
(2015-07-31)
Answers To 5 Big Data Trend Questions
 
(2015-07-24)
7 big data management best practices for your IT playbook
 
(2015-07-21)
Securing Hadoop - inflating the life rafts for big data lakes
 
(2015-07-21)
Common cybersecurity myths debunked
 
(2015-06-26)
What should an IT systems analyst learn about big data?
 
(2015-06-26)
What Businesses Really Think Of Big Data
 
(2015-06-26)
Survey: Big Data Systems Need Tighter Security Controls
 
(2015-06-23)
Hadoop’s potential also comes with big security questions
 
(2015-06-19)
Hadoop security: Don't build your data lake without it
 
(2015-02-17)
Hitachi Data Systems Picks Hortonworks for Hadoop
 
(2015-02-13)
Hortonworks Takes On Thankless, Necessary Job For Governing Data In Hadoop
 
(2015-02-08)
Hadoop Isn’t For Everyone, But There Are Cloud-Based Big Data Solutions For Us All
 
(2014-12-19)
Make sure big data doesn't land you in big trouble
 
(2014-11-15)
The decline and fall of big data
 
(2014-11-14)
Big data and privacy: Isn't it really a debate about trust? -- Strata + Hadoop 2014
 
(2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 5)
 
(2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 4)
 
(2014-10-15)
Page
1
2
3
4
>
Categories
Cyber
data security
privacy
AI
new technologies data-protection AI
Preserving Privacy
ISACA
Privacy-Preserving Analytics
Secure Multiparty Computation
Security
Data
Ransomware
Attacks
Protect
Cloud
ISSA
pandemic
encryption
tokenization
hipaa
QA
SA
Quality Assurance
Security Assurance
Waterfall
AppDev
Agile Development
DataOps
DevOps
Compliance
NIST
PCI DSS
Data. Privacy
GDPR
CCPA
Machine Learning
PII
PI
Data Discovery
SC Magazine
BigID
Discovery
Trustwave
FFIEC
WInfosecurity
dataops
nist
standards
rsac
RSAC 2020
coronavirus
blockchain
bitcoin
databases
breaches
PCI
HITECH
RSA
• Breaches
cyber attack
cyber security
cyber threat
data breach
data protection
BlindSpots
NYC
Oracle
NYOUG
siem
linkedin
blind spots
ulf
mattsson
DSS
CSA
Gartner
Ponemon
IBM
verizon
big data
IoT
Business
Alanta
hadoop
masking
Protection
Strategy
pci. hipaa
regulations
Healthcare
tokenzation
masking
Trends
Data Protection Strategy
brighttal
FS-ISAC
monitoring
audit
Cybersecurity
ulfmattsson
privace
cio
ciso
Data-Centric
Digital Business
New York City
Analytics
risk
attack
breach
Justice Department
Charges
Iranian
Hackers
Cyberattack
Dam
power grid
C-suite
itproportal
crime
Execs
Software
Silicon Valley
greenwichtime
IOTcomputerweekly
RSA 2016
RSA Conference
DoJ
Apple
Redmondmag
RSAC2016
nerc
power plants
obama
energy
atacks
power systems
rsa conference
govtech
government
RSA-2016
States
Digital-Age
safeguarding
hacks
hack-worthy
targets
InformationWeek
Chief Data Officer
CDO
InformationWeek
Target
Gartner
ITPortal
SEC
financial services
malware
Internet of Things
health
EU
regulators
EU-U.S.
data transfers
data. breach
compromises
voter
krqe
IDG
zdnet
medical
mentization
keys
McAfee
Dark Reading
cross border
Microsoft
Aberdeen
Amazon
Microsoft
SANS
SMB
internet
wsj
deloitte
SAfe Harbor
ruled
invalid
European Court of Justice
ECJ
AWS
eWeek
Hortonworks
BYOK
Forbes
anonymize
se-identify
DCAP
policy
gateway
EMV
Visa
Mastercard
monitor
Government
cars
europe
Safe Harbour
Threat
bankinfosecurity.com
re-personalise
anonymous data
Analysis
Multidimensional
Information
Governance
legislation
InformationWeek
#8203
zd.net
EU
perimeter
Trump
Hotels
Hacked
Infosecurity Magazine
T-Mobile
Experian
Customer Data
hacks tokenization
BankInfoSecurity
data center
tokenization
Tor
hack
retail
data-lake
BigData
database
Exadata
Cloud
storage
stolen
Lloyds
customer account
lost
encrypted
medical record
Computerworld
ftc
wyndham
kerberos
VMware
virtualization
ell
CSO
Ashley Madison
CEO
tokrnization
forbes
sue
appeals court
NSA
quantum
intel
Privacy
skills
Google
Dropbox
man-in-the-cloud
Carphone
TalkTalk
Warehouse
gateways
regulatory
concerns
SaaS
insider
JPMorgan
HSBC
cyber-security
secure
private cloud
health care
DHS
Enterprise
IT Operations
Big-Data
UK
finance
banks
Data centric
IP
payment
workforce
jobs
Symantec
OPM
smartwatches
SAP
biometrics
Key Management
Concern
Businesses
Identity theft
block attack
Feds
firewall
network
Trump. hotel
China
benchmark
helthcare
CXO
COO
forrester
Physical security
Financial
Hewlett-Packard
files
collaboration
FireEye
Auto
Cyberattacks
talent
mature
IT
operation
DNA
exposed
SSNs
personnel records
fed workers
Securing
Debacle
box
Check Point
IRS
Heartland
Snowden
social security numbers
russia
FBI
hybrid
chip
technology
card
Bracket
insurance
sally
Quality
board
Quality
Innovation
research
impersonating
data breaches
IT careers
Rx
Merchants
PCI 3.1
computers
Merchant
Coca-Cola
Mobility
Premera
hhs
Mandarin Oriental
Hotel
Credit Card
Breach
antivirus
Hitachi
Hortonworks
Anthem
Governing
Health insurer
Access
Records
Customers
Trusted
patches
brighttalk
US
website
personal
outside
human errors
JP Morgan
Chase
Azure
issue
Shadow IT
hosted
US Federal Trade Commission
managing security
Privacy Value of Data
Cloud. security
Secrets
spies
2015
Webroot
Predictions
Sony
asia
Xbox
PlayStation
credit cards
fraud
CYBERCRIMINALS. banks
Response
Mistakes
US lawmaker
foreign
intrigue star wattage
lawmaker
boardroom
Staples
hacking
North Korea
JP Morgan Chase
bank
Hollywood
ETF
Cyber-Security Spending
Data destruction
endpoint intelligence
user behavior
national
crisis
KPMG
INTELLECTUAL
THEFT
WORRIES
nation-state
war
Bloomberg
Mandiant
IDC
New Zealand
always-on
Study
Cyber Attacks
law
govern
Home Depot
big data data
Information
mobile
Monetization
Trust
cybercrime
trust
budget
Bebe
Computing
PlayStation
Servers
Stolen Dat
Personal Information
Employees
movies
leaked
CNET
Healthcare Data
Salaries
PYMNTS
data flow
TOKENS
voltage
emails
Chip and PIN
NYT
New York Times
CTO
Cloudera
Informatica
yahoo
cyber crime
auditors
Race
J.P. Morgan
Road-Race
retailers
safe
experts
increasing
decade
california
Breache
Report
Analyze
POS
CYBERCRIMINALS
Education
Backoff
Protect Data
Preventing
encrypt
Virtual
Private
Corporate
Retailer
NY Times
NYTimes
icloud
scmagazine
council
Obama executive order
biometric
retina
password
hardware
technology
transactions
Mainframe
best practices
Kmart
Breached
SEARS
Strata
Thought Leader
Avatar
Teradata
QSA
Wall Street
Think Tank
Celebrity
photo
leaks
issues
CYBERTHIEVES
K-MART
DAIRY QUEEN
Fidelity
Photos
Leak
MBIA
Breach
Security Ops
Risk Management
AtT
threats
inside
NY Metro
Conference
Cyber Insurance
Policies
Home Deport
Fortune
USATODAY
ABC
CIA
PIN
Shellshock
Bug
Heartbleed
Android
Phones
Bash
Smartphone
VIATOUR
TripAdvisor
Payment Card Data
Home Depots PR problems dwarfed by Target breach
Moneywatch: Home Depot data breach
NASDAQ
Atlanta
voltage#
PCI-DSS
epidemic
identity
responsible
Hack Exposes
Lawmakers
SSC
PCI DSS 3.0
merchants
InfraGard
ISC2
OWASP
Practical Advice
Thefts
Break
HealthCare.gov
Victim
FT
Market watchdog
cloud computing
CBS
NBC
CNBC
iPhone
UCard
coordination
India
Patient
Risk. Security
security risk
health practices
Internet of Things
CHS
Breach. Health
Care
Illness
Researchers
steals
Gmail
online
banking
TOKEN
PAYMENTS
standard
UPS
account
Supervalu
Avoidable
supermarket
chains
Acquisition
breaches
P.F. Changs
Russian
Lesson
plan
Market
billion
passwords
Shares
Cost
eBay
Forbes
audits
breachesprofessionalized
PF Chang
restaurants
customer
data stolen
Saving
Practical
Advice
CRM
Salesforce
Investigations
2014
Target breach
Manufacturing
Darkreading
Settlement
license
Protegrity
patents
Safenet
Ingrian
EPS
Element Payment Services
Liaison
nuBridges
lawsuit
Michaels
Heartbleed Bug
healthcare
Canada
Cyber threats
insurance industry
financial institutions
APT
SP
Data
Profit
Health Data
Senate
Data Theft
Auditor
Sued
Strategies
TCO
Data privacy
regulation
offshoring
outsourcing
Davos
Chinese
UN
Congress
testify
Neiman Marcus
Social
Top IT
Trends for 2014
pricavy
Protecting
Privilege
data security
Ancestry.com
eu cross border
snowden
EY
Ernst Young
business data
worm
Vulnerable
Encryption
Spying
information security
privacy legislation
Cross-Border
Off-Shoring
Sensitive Data
profits
adobe
Data Security
Value
advantage
Predictive
Cyber risk
Power utilities companies
liability
specialists
Survival
Insecure
Cyberworld
compromise
privacy
insider threats
Privileged users
Data Leaks
health insurance
Lawmakers
In-House
Data Thief
standards
data security
TOI
timesofindia
LulzSec
hacker
Societe Generale
Mumbai
COBIT
digital currency
Perfect Money
surveillance
financial data
databreach
enforcement
authority
Prevention
Boards
Outsourced
NBCNews
notification
Hospitals
Group Practices
Payers
HR
FDA
insiders
CreditCards
Mining
PHI
Data scientist
ColdFusion
venture capital
privileged account
attackers
data asecurity
challenges
solutions
My #HIPAA presentation in phi
Data Tokenizing
Issued and Pending Patents
Ulf Mattsson's Blogs
Chain-of-Trust
SQL Encryption
Oracle Encryption
DB2 Encryption
Intrusion and Data Leakage Prevention
Performance and Scalability
Database Protection
Data and Application Security
Regulatory Requirements and Industry Initiatives
View all