Access your Pro+ Content below.
The big data challenge: What's in store for NoSQL security
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of loss and exposure. What technologies should be in place to enforce NoSQL security controls on-premises and in the cloud? Adrian Lane explores these issues in this month's cover story. We also report on IT security's role in cyberinsurance, as organizations seek to transfer risk and hedge their losses in an immature market with complex policies. Finally, we look at FedRamp 2.0 and its potential ramifications as a far-reaching model for cloud security standards, just months after the June deadline for compliance with the government program. And columnist Marcus Ranum interviews Columbia University's Joel Rosenblatt about his latest projects with security metrics and how their use can benefit security programs.
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Big data offers horizontal scalability, but how do you get your database security to scale along with it?
Immature products and a lack of standardization raise critical questions about first-party risk and third-party liability.
FedRAMP raises the bar for security among applicable cloud providers, but can it influence broader cloud computing contracts and standards?
This Beyond the Page examines how some enterprises are protecting their big-data ecosystems with encryption, security data analysis and visualization.
Columns in this issue
Security deserves a seat at the risk management table.
Marcus Ranum chats with Columbia University's Joel Rosenblatt to learn how "apples to apples" comparisons helped automate critical security processes.
Threat intelligence feeds help you prioritize signals from internal systems against unknown threats. Security intelligence takes it a step further.