Access "Managing big data privacy concerns: Tactics for proactive enterprises"
This article is part of the March 2013/ Volume 15 / No. 2 issue of Outsourcing security services
It would seem everyone is taking notice of the phenomenon known as big data, even the federal government. The Federal Trade Commission (FTC) late last year issued orders to nine companies in the data broker industry, requiring them to provide information on their consumer data collection and usage practices. The FTC action is a clear signal that while the emerging uses of big data offer promising business benefits, there are significant privacy implications. Why Use Big Data? Big data is different from past data warehousing efforts because it performs analytics on almost any type of data file or format, including images, videos, and data gathered from social media. Another characteristic of big data is that it does not have the “one to one” relationship of server to data storage, but relies on virtualization architecture, needed to be able to draw from large content stores and archives as a single global resource. Among corporate executives and line-of-business managers, the compelling motivation in using big data is to formulate more accurate, detailed ... Access >>>
Premium Content for Free.
Outsourcing security services in the enterprise: Where to begin
by Mike Chapple, Enterprise Compliance
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services.
Managing big data privacy concerns: Tactics for proactive enterprises
by Lynn Goodendorf, Contributor
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help enterprises get smarter while keeping consumers happy.
- Outsourcing security services in the enterprise: Where to begin by Mike Chapple, Enterprise Compliance
Antivirus evasion techniques show ease in avoiding antivirus detection
by Joe Granneman, Contributor
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed.
- Antivirus evasion techniques show ease in avoiding antivirus detection by Joe Granneman, Contributor
Big data creates cloudy security forecast
by Robert Richardson
Security in the cloud has come a long way and it’s now possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud.
Well-rounded information security education benefits IT professionals
by Doug Jacobson and Julie A. Rursch
A security-savvy IT staff can help reduce risk. Learn about information security training and education options for IT professionals.
Marcus Ranum: Cloud service-level agreements
by Marcus Ranum
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with Randy Sabett, counsel at ZwillGen PLLC and formerly with the National Security Agency to discuss cloud SLAs.
- Big data creates cloudy security forecast by Robert Richardson
More Premium Content Accessible For Free
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
Is your mobile security strategy combating the wrong enemy?
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
What's the best focus for MDM strategy now?
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...