Access "Big data issues: Big data analytics offers both rewards and risks"
This article is part of the October 2012 issue of Security Readers' Choice Awards 2012: Your picks for the best security products
The volume of data that businesses collect is exploding exponentially. This includes financial transactions, location-based data, customer interactions, the supply chain, as well as data produced by employees, contractors, partners and suppliers using social networking sites, intranets, extranets, and corporate wikis. In fact, sources such as mobile and online transactions, social media traffic and GPS coordinates now generate more than 2.5 quintillion bytes of "big data" every day, according to IBM.. The commercial impacts of big data analytics – the practice of performing increasingly sophisticated analysis on massive amounts of data, predominantly unstructured – have the potential to generate significant productivity growth for a number of vertical industry sectors. In short, big data analytics presents an opportunity to create unprecedented business advantage and better service delivery. At the same time, it promises benefits for information security while also presenting increased risks. Senior executives and boards the world over are now faced with ... Access >>>
Premium Content for Free.
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
The hacktivist threat to enterprise security
by Robert Westervelt
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
- 2012 Readers' Choice Awards
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
- Threat prevention techniques: Best practices for threat management by Diana Kelley, Contributor
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
Java security problems: Is disabling Java the answer?
by Marcia Savage
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
- Big data issues: Big data analytics offers both rewards and risks by Steve Durbin, Contributor
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...