Information Security

Defending the digital infrastructure


Get started Bring yourself up to speed with our introductory content.

Beyond the Page: Using big data for defense

This Beyond the Page examines how some enterprises are protecting their big-data ecosystems with encryption, security data analysis and visualization.

In the rush to capitalize on big data, many companies forget that developing an ecosystem of structured and unstructured data means higher risk of leaks and loss and greater exposure to threats. 

What technologies should be in place to enforce data security controls on-premises and in the cloud? How can organizations have visibility into third-party providers that access or store their data? 

Find out how some enterprises are trying to protect their big-data ecosystems with encryption, security data analysis, visualization and other strategies. 


Beyond the Page is a multimedia supplement to Information Security magazine. This concise packet of material -- feature article, webcast and practical technical tip from our experts and contributors -- provides security pros and decision makers the in-depth information they need for implementation, management or troubleshooting.


Feature: The NoSQL challenge: What's in store for big data and security
Big data offers horizontal scalability, but how do you get your database security to scale along with it?

Webcast: Adrian Lane on protecting big data with NoSQL security architectures
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments.

Tip: Is Kerberos the key to big data authentication?
Many Hadoop variants offer fully integrated Kerberos, with facilities to improve setup and link to your existing identity repository.

About the expert: Adrian Lane is a Securosis senior security strategist who specializes in database architecture, data security and secure code development. Prior to joining Securosis, he was the chief technology officer at database security firm IPLocks, vice president of engineering at Touchpoint, and CTO of the secure payment and digital rights management firm Transactor/Brodia. He holds a degree in computer science from the University of California at Berkeley, and did post-graduate work in operating systems at Stanford University.


Article 4 of 7
This was last published in August 2014

Dig Deeper on Active Directory security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All