BYOD/Big Data

Back to homepage

Big Data and Cybersecurity – Making it Work in Practice

In today’s complex IT environment, identifying security events fast is critical to minimizing the impact. However, in order to detect and remediate attacks in this environment, security teams need the

Top Four Challenges That Can Create Tough Sledding for Your Data Security and Compliance Program

Running a data security program can be an overwhelming and, at times, a thankless job. With one foot in the security world and the other in the database world managing

The evolution of BYOD security in a mobile-first world

Bitglass’ research team surveyed 200 IT and security professionals at a national Gartner conference to learn more about the evolution of BYOD security in a mobile-first world. Click Here To

Quarter of Firms Allow Password-Only BYOD Security

Over a quarter (28%) of organizations rely solely on user-generated passwords to secure BYOD, potentially exposing countless endpoints to credential guessing, cracking and theft, according to Bitglass. Click Here To View

5 secrets of the data lake revealed for the enterprise

How should enterprises make the most out of their data lakes, in order to derive value and improve operational performance?As you take on this journey, always remind yourself about complementary

Solving Cyber Security Quagmire Through The Prism Of Big Data

It would not be an over statement to say that widespread cyber attacks crippling global businesses has become the new normal. The speed and scale of the recent ransomware attacks

BYOD Drives Prevalence of Insider Threat – Infosecurity Magazine

Over three-fifths of IT professionals believe that insider threats are more difficult to spot than attacks by malicious third parties, with the explosion in mobile endpoints a key challenge, according

Employees represent the ‘biggest data security risk’

IT professionals believe that compliance and regulation, and the unpredictable behaviour of employees will have the biggest impact on data security according to a new Concensus survey commissioned by independent

Using Virtualization To Enhance Security, Save On Infrastructure – CXOtoday.com

Gone are the days when employees joined the organizations with lifetime commitment. There are competing priorities including family considerations, children’s education, job of the spouse etc. in addition to age

The 5 worst big data privacy risks (and how to guard against them) – CSO Online

Big data, as its proponents have been saying for nearly a decade now, can bring big benefits: advertisements focused on what you actually want to buy, smart cars that can