Premium Content

Access "The big data challenge: What's in store for NoSQL security"

Issue Overview

Information Security magazine - July / August 2014 Vol. 16 / No. 6

In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of loss and exposure. What technologies should be in place to enforce NoSQL security controls on-premises and in the cloud? Adrian Lane explores these issues in this month's cover story. We also report on IT security's role in cyberinsurance, as organizations seek to transfer risk and hedge their losses in an immature market with complex policies. Finally, we look at FedRamp 2.0 and its potential ramifications as a far-reaching model for cloud security standards, just months after the June deadline for compliance with the government program. And columnist Marcus Ranum interviews Columbia University's Joel Rosenblatt about his latest projects with security metrics and how their use can benefit security programs.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...