Security

Recent Articles

  • How Cloud, BYOD Strategies Create Insider Threats

    How Cloud, BYOD Strategies Create Insider Threats How Cloud, BYOD Strategies Create Insider Threats Although adoption of the cloud and BYOD practices is generally perceived as positive for businesses, these shifts can fuel insider threats, a poll of cyber-security pros finds. Big Threats One in three organizations have experienced an insider attack in the last…

  • IT Security Opportunities: From Cloud to Analytics

    The continued growth in IT security opportunities correlates with metamorphoses in both the technology sector and the security world. Indeed, during the last two years, just about every aspect of IT security has been utterly transformed. Not only are there more lethal threats than ever, but the way IT security is deployed and managed has…

  • Big Data Analytics Gives Security Boost to Feds

    Big data analytics Big Data Analytics Gives Security Boost to Feds Most federal IT managers are using big data analytics in some form for cyber-security. Yet obstacles remain, including a shortage of skilled talent and poor management support. Data Security Benefits Feds believe that fully leveraging big data for cyber-security will improve protection from external…

  • Big Data Analytics Comes to IT Security

    Big data and security Big Data Analytics Comes to IT Security Big data analytics is playing a crucial role in IT security, a new report from the Ponemon Institute and Cloudera finds. Maturity of IT Security Just under a third self-describe their IT security posture as mature while 40% say they are in the late…

  • Measuring the IT Security Skills Shortage’s Extent

    IT security skills Measuring the IT Security Skills Shortage’s Extent Grasping the extent of a problem is the first step to solving it. New research examines the IT skills shortage and how it affects organizations large and small. Confidence in IT Security 59% of respondents were not completely sure that their networks have not been…

  • 10 Best Practices for Security, Compliance Monitoring

    Data poisoning 10 Best Practices for Security, Compliance Monitoring Of the Cloud Security Alliance 100 best practices in big data security, we focus on 10 best practices for ensuring real-time security and compliance monitoring. Anomaly Detection Apply big data analytics to detect anomalous connections to a cluster to ensure only authorized connections are allowed. Event…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.