Access your Pro+ Content below.
Beyond the Page: Using big data for defense
This article is part of the Information Security magazine issue of July / August 2014 Vol. 16 / No. 6
In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of leaks and loss and greater exposure to threats. What technologies should be in place to enforce data security controls on-premises and in the cloud? How can organizations have visibility into third-party providers that access or store their data? Find out how some enterprises are trying to protect their big-data ecosystems with encryption, security data analysis, visualization and other strategies. Beyond the Page is a multimedia supplement to Information Security magazine. This concise packet of material -- feature article, webcast and practical technical tip from our experts and contributors -- provides security pros and decision makers the in-depth information they need for implementation, management or troubleshooting. Feature: The NoSQL challenge: What's in store for big data and security Big data offers horizontal scalability, but how do you get your database security to ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Big data offers horizontal scalability, but how do you get your database security to scale along with it?
Immature products and a lack of standardization raise critical questions about first-party risk and third-party liability.
FedRAMP raises the bar for security among applicable cloud providers, but can it influence broader cloud computing contracts and standards?
This Beyond the Page examines how some enterprises are protecting their big-data ecosystems with encryption, security data analysis and visualization.
Columns in this issue
Security deserves a seat at the risk management table.
Marcus Ranum chats with Columbia University's Joel Rosenblatt to learn how "apples to apples" comparisons helped automate critical security processes.
Threat intelligence feeds help you prioritize signals from internal systems against unknown threats. Security intelligence takes it a step further.