An ongoing security operations center challenge is trying to get the right data to the right person at the right time. The problem is compounded by there being "too much data and not finding the right people to deal with the data," says Mischa Peters of IntSights. What can help?
Numerous technology firms now offer facial biometrics recognition search tools for big data sets. But information security expert Alan Woodward warns that these big data sets must be "considered and regulated very heavily" or else we'll be "living in 1984 without knowing it."
What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.
A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics, says Jacob Olcott of BitSight. He offers advice for maximizing the opportunity in front of the Board.
Hybrid cloud adoption is accelerating within the financial services industry and few organizations have a solid understanding of how to secure hybrid cloud.
Most companies employ an array of cloud services from an array of providers, each with its own set of security controls, frameworks and products that increase...
The regulator and legislative fallout of the global financial crisis continues to place intense pressure on the financial industry.
Not only is the volume of regulations growing, so is their complexity a result of the diverse and inconsistent array of regional and jurisdictional mandates being imposed on financial...
Today, consumers are using millions of devices to buy whatever, whenever, wherever. This rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
Taking advantage of the wealth of data maintained by banks is...
As big-data analytics matures, it will play a bigger role, but security information and event management software, or SIEMs, will also remain essential, contends Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...