1.888.749.9800

Big Data

The Brave New World Of Cloud Application Security

by Teresa Meek, Workday Contributor, Forbes, August 3, 2016

As businesses continue their flight to the cloud, their concerns about security are changing. The cloud can offer companies better security than their own data centers — but only if they understand how to manage the responsibilities that come with it.

What Smaller Businesses Can’t Do

For years, security concerns kept companies from migrating their data […]

By |August 4th, 2016|Big Data, News & Events|Comments Off on The Brave New World Of Cloud Application Security

Security Risks Created by Emerging Technologies

In a recent Q&A session, Joe Clapp and I were asked to address the security risks that the continuing technological change in cloud data center poses. Following are our responses to the most common risks associated with cloud data center change and our recommendations how to safeguard data given these considerations.

Data and data handling needs created by […]

By |September 18th, 2015|Big Data, Blog|Comments Off on Security Risks Created by Emerging Technologies
  • Permalink Gallery

    Why Securing Only the Network Perimeter is the Wrong Approach

Why Securing Only the Network Perimeter is the Wrong Approach

Every time I encounter an organization that focuses on perimeter security while ignoring best practices on the internal network I think of Gary Larson’s Far Side cartoon where two polar bears are on either side of an igloo and one says to the other, “Oh hey! I just love these things!…Crunchy on the outside and a chewy center!”

Perimeters have […]

By |March 30th, 2015|Big Data, Blog|Comments Off on Why Securing Only the Network Perimeter is the Wrong Approach

Defending Big Data

SC Magazine’s Stephen Lawton recently interviewed me for the publication’s latest eBook Defending Big Data, looking at the big business of Big Data. During our conversation, I talked about how Big Data can create big problems for CISOs, because it is a major target for cyber criminals seeking to steal proprietary information, intellectual property and government information. I’m quoted […]

By |November 18th, 2014|Big Data, Blog|Comments Off on Defending Big Data