Register | Help


79 publications found:

How the Latest Trends in Data Security Can Help Your Data Protection Strategy   (2016-07-11)
Securing big data, a cross-technology challenge infoworld.com   (2015-11-11)
Be the Power Behind the Throne: Create a Secure Environment for Big Data: https://securityintelligence.com/be-the-power-behind-the-throne-create-a-secure-environment-for-big-data/   (2015-10-23)
How to hack Hadoop (and how to prevent others doing it to you)   (2015-10-20)
Managing Big Data Integration and Security with Hadoop   (2015-09-03)
6 Misconceptions of Big Data   (2015-08-05)
Xerox: How Privacy Engineering Is Changing Big Data   (2015-08-05)
Stolen Consumer Data Is a Smaller Problem Than It Seems   (2015-07-31)
Answers To 5 Big Data Trend Questions   (2015-07-24)
7 big data management best practices for your IT playbook   (2015-07-21)
Securing Hadoop - inflating the life rafts for big data lakes   (2015-07-21)
Common cybersecurity myths debunked   (2015-06-26)
What should an IT systems analyst learn about big data?   (2015-06-26)
What Businesses Really Think Of Big Data   (2015-06-26)
Survey: Big Data Systems Need Tighter Security Controls   (2015-06-23)
Hadoop’s potential also comes with big security questions   (2015-06-19)
Hadoop security: Don't build your data lake without it   (2015-02-17)
Hitachi Data Systems Picks Hortonworks for Hadoop   (2015-02-13)
Hortonworks Takes On Thankless, Necessary Job For Governing Data In Hadoop   (2015-02-08)
Hadoop Isn’t For Everyone, But There Are Cloud-Based Big Data Solutions For Us All   (2014-12-19)
Make sure big data doesn't land you in big trouble   (2014-11-15)
The decline and fall of big data   (2014-11-14)
Big data and privacy: Isn't it really a debate about trust? -- Strata + Hadoop 2014   (2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 5)   (2014-10-16)
Thought Leaders in Big Data: Ulf Mattsson, CTO of Protegrity (Part 4)   (2014-10-15)

Page 1 2 3 4 >


Security Protect Ransomware Attacks Data Cloud ISSA pandemic privacy encryption tokenization hipaa QA SA Quality Assurance Security Assurance Waterfall AppDev Agile Development DataOps DevOps Compliance NIST PCI DSS Data. Privacy GDPR CCPA Machine Learning AI PII PI Data Discovery SC Magazine BigID Discovery Trustwave FFIEC WInfosecurity ISACA dataops nist standards rsac RSAC 2020 coronavirus blockchain bitcoin databases breaches PCI HITECH RSA • Breaches cyber attack cyber security cyber threat data breach data protection data security BlindSpots NYC Oracle NYOUG siem linkedin blind spots ulf mattsson DSS CSA Gartner Ponemon IBM verizon big data IoT Business Alanta hadoop masking Protection Strategy pci. hipaa regulations Healthcare tokenzation masking Trends Data Protection Strategy brighttal FS-ISAC monitoring audit Cybersecurity ulfmattsson privace cio ciso Data-Centric Digital Business New York City Analytics risk attack breach Justice Department Charges Iranian Hackers Cyberattack Dam power grid C-suite itproportal crime Execs Software Silicon Valley greenwichtime
Showing 50 most recent tags.
View all