Access your Pro+ Content below.
Managing big data privacy concerns: Tactics for proactive enterprises
This article is part of the Information Security magazine issue of March 2013/ Volume 15 / No. 2
It would seem everyone is taking notice of the phenomenon known as big data, even the federal government. The Federal Trade Commission (FTC) late last year issued orders to nine companies in the data broker industry, requiring them to provide information on their consumer data collection and usage practices. The FTC action is a clear signal that while the emerging uses of big data offer promising business benefits, there are significant privacy implications. Why Use Big Data? Big data is different from past data warehousing efforts because it performs analytics on almost any type of data file or format, including images, videos, and data gathered from social media. Another characteristic of big data is that it does not have the “one to one” relationship of server to data storage, but relies on virtualization architecture, needed to be able to draw from large content stores and archives as a single global resource. Among corporate executives and line-of-business managers, the compelling motivation in using big data is to ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Outsourcing security services doesn’t have to mean moving to the cloud. Enterprises have many options for outsourcing security services, including managed and hosted services.
In the wake of the New York Times attack, a look at antivirus evasion techniques show how easy it is to avoid antivirus detection and why new defenses are needed.
The growing use of big data analytics has created big data privacy concerns, yet viable tactics exist for proactive enterprises to help companies get smarter while keeping consumers happy.
Columns in this issue
Security in the cloud has come a long way and it’s now possible to control the quality of security you get in Web deployments, and to monitor what’s going on in your slice of the cloud.
A security-savvy IT staff can help reduce risk. Learn about information security training and education options for IT professionals.
Marcus Ranum, security expert and Information Security magazine columnist, goes one-on-one with Randy Sabett, counsel at ZwillGen PLLC and formerly with the National Security Agency to discuss cloud SLAs.