Big Data

Big Data news, analysis, research, how-to, opinion, and video.

big data laptop analytics data science
cybersecurity boards

intelbpstorage

When big data gets personal...and cloudy

What are the considerations for security and scalability when choosing cloud storage for identity platforms that service multiple millions, even billions of users?

Data analytics dashboard on a laptop

User behavior analytics: separating hype from reality

UBA has already produced successes against some of the security community’s toughest challenges and will continue to evolve as time goes by.

privacy

How much is a good deal worth?

When advertising crosses the line into invasion of privacy, consumers need to ask hard questions about what personal data they’re giving away.

solar eclipse

When identity data eclipses digital identity

Digital identity needs to be redefined as verified identity data. Identity data, using the right tools, can be used to carry out online jobs on behalf of the real me. But the right technology, aka personal data stores, need to be in...

6 regulations

GDPR – What security pros need to know about the new era of privacy regulations

Many security professionals no doubt have heard of the new European Union (EU) omnibus data protection regulation called GDPR. GDPR, which stands for the EU General Data Protection Regulation, is in many ways a landmark regulation...

balloons in sky celebration party

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for — and how to protect yourself and...

artificial intelligence / machine learning / network

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats.

rtx2i8y7 2

Yes, Uber can – and will – get worse

It might be hard to imagine how things could get worse for Uber – but they will!

8 encryption

Who's Down with MPC? (Yeah, You Know Me!)

MultiParty Computation improves data security by calculating encrypted information - what is not revealed cannot be leaked.

privacy

Big data and relinquishing your right to privacy

Now more than ever, it’s time for us speak up about our right to privacy.

0630 satellite atm indonesia

Red Bull’s Eye in the (Cyberspace) Sky

AT&T recently announced they will provide full time Internet-of-Things (IoT) monitoring of up to one million Red Bull coolers in retail locations worldwide.  If successful, this will be a powerful example of what Big Data can...

mobile tablet statistics analytics stocks

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

future jobs 1

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving...

marketing automation gears

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

16 automation

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use - if they have already laid the required ground work....

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

eliminate insider threats 1

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

virtual reality robot

AI will transform information security, but it won’t happen overnight

Artificial Intelligence technologies are evolving quickly, but can they aid an InfoSec community still grappling with default passwords and SQLi attacks?

Load More
You Might Also Like
BrandPosts
Learn more