Big Data
The evolution of threat detection and Big Data
Mark Gazit is the CEO of ThetaRay, a specialist in threat detection. In this interview he talks about leveraging Big Data to secure networks, the advantages of using …
Overcoming Big Data security obstacles
When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …
Using security, cloud and Big Data to drive success
Dell surveyed more than 2,000 global organizations and found that security is the biggest concern in adopting cloud, mobility and Big Data. While 97 percent of organizations …
IBM’s Big Data analytics solution to uncover criminal cyber activity in seconds
IBM announced new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate …
EU Commission and data industry to master Big Data
The European Commission and Europe’s data industry have committed to invest €2.5 billion in a public-private partnership (PPP) that aims to strengthen the data …
Five of the biggest data myths debunked
With so much hype about big data, it’s hard for IT leaders to know how to exploit its potential. Gartner dispels five myths to help IT leaders evolve their information …
Big Data is big noise
Big Data was supposed to be the solution to all our security problems, but this spotlight on intruders turned out to be a mess of white noise. Hiding comfortably in that …
Open source threat visualization engine for infosec pros
OpenDNS has released OpenGraphiti, an interactive open source data visualization engine that enables security analysts, researchers and data scientists to pair visualization …
What is the primary driver for data lakes?
The growing hype surrounding data lakes is causing substantial confusion in the information management space, according to Gartner. Several vendors are marketing data lakes as …
Big Data security mistakes, tips and tricks
In this interview, Mark Cusack, Chief Architect at RainStor, talks about the main challenges of handling petabyte-scale volumes of data, illustrates the most obvious mistakes …
Top 10 technologies for information security in 2014
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2014. “Enterprises are dedicating increasing …
Big Data needs a data-centric security focus
CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …