Access "A framework for big data security"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Your organization likely is just starting to experience the joys of “big data.” Companies are enthralled with the idea of leveraging large quantities of data for targeted marketing or other initiatives. As with any new love affair, they’re blind to the flaws of their beloved. It is imperative, however, that you -- users of the data -- understand these massive data stores contain significant amounts of toxic data. Toxic data is any data that could be damaging to an organization if it leaves that organization's control. Typically, toxic data includes custodial data -- such as credit card numbers, personally identifiable information (PII) like Social Security numbers, and personal health information (PHI) -- and sensitive intellectual property, including business plans and product designs. Today, cyberthieves and nation-state agents are actively working to steal this toxic data. Inadequately secured and poorly controlled big data environments can potentially make it easier by reducing the number of places these thieves must compromise in order to steal the ... Access >>>
Premium Content for Free.
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
- Unlocking the opportunity of SIEM technology by Andrew Hutchison
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
Symantec breach highlights remote management holes
by Robert Westervelt, News Director
Poorly configured remote administration tools are a common attack vector, security experts say.
- The RSA breach: One year later by Marcia Savage, Michael S. Mimoso and Robert Westervelt
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage, Editor
After a string of breaches at major security vendors, whom can we trust?
- A framework for big data security by John Kindervag, Contributor
More Premium Content Accessible For Free
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security ...
You can fight compliance or embrace it, but one way or the other, you can’t escape it. Increasingly, smart organizations are not just accepting ...