Premium Content

Access "The big data challenge: What's in store for NoSQL security"

Issue Overview

Information Security magazine - July / August 2014 Vol. 16 / No. 6

In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of loss and exposure. What technologies should be in place to enforce NoSQL security controls on-premises and in the cloud? Adrian Lane explores these issues in this month's cover story. We also report on IT security's role in cyberinsurance, as organizations seek to transfer risk and hedge their losses in an immature market with complex policies. Finally, we look at FedRamp 2.0 and its potential ramifications as a far-reaching model for cloud security standards, just months after the June deadline for compliance with the government program. And columnist Marcus Ranum interviews Columbia University's Joel Rosenblatt about his latest projects with security metrics and how their use can benefit security programs.   Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...