Email Alerts
-
What is 'big data'? Understanding big data security issues
In this Ask the Expert video, Ernie Hayden answers the question of what 'big data' is and outlines big data security issues in this video. Answer
-
Verizon DBIR: Identify insider threat warning signs, safeguard IP
Trusted insiders often play a role in IP theft, according to a new report. Spot the warning signs and apply the right data protection, say experts. News
-
Security big data: Preparing for a big data collection implementation
Learn how security big data initiatives support enterprise information security and how to prepare for a big data collection implementation. Tip
-
Intro: How big data benefits enterprise information security posture
Andrew Hutchison explains how big data benefits enterprise information security posture by merging the security and operational data landscape. Tip
-
Log management and analysis: How, when and why
In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture. Video
-
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Answer
-
Gartner: Big data security will be a struggle, but necessary
The research firm says big data security analysis will be critical to fighting off advanced attacks, but few easy technology options exist today. News
-
Does reducing data storage improve PCI credit card compliance?
Mike Chapple discusses whether reducing customer credit card data storage is better, worse or ineffective for improving PCI credit card compliance. Answer
-
Information security intelligence demands network traffic visibility
Use the network and host data at your disposal to create business-focused information security intelligence policies and strategies. Tip
-
Security event log management, analysis needs effective ways to search log files
Search is a key discipline for security log management. John Burke explains how to better search log files to improve security event log management. Tip
Security Management Strategies for the CIO