Read more about Big Data
Bookmark and Share
  • Native Hadoop security tools are not enough

    18.03.2015

    While an overwhelming majority of Hadoop users agree that data security is a critical requirement, most disagree or are not sure that its native security tools provide enough protection for their sensitive data.

  • Five key IT security trends for 2015

    05.02.2015

    Here's a look at five key IT security trends and solutions for 2015.

  • Information Security Analytics

    08.01.2015

    Authors: Mark Talabis, Robert McPherson, I. Miyamoto, Jason Martin Pages: 182 Publisher: Syngress ISBN: 0128002077 Introduction We've all heard about Big Data and security analytics as solutions to a variety of information security problems.

  • Big Data analytics to the rescue

    11.12.2014

    In the battle against cyber criminals, the good guys have suffered some heavy losses.

  • Negotiating privacy in the age of Big Data

    09.12.2014

    Unlike traditional data collection that uses a statistical sampling to make predictions about the whole, the promise of Big Data is that you can now go beyond a small sampling.




Spotlight

Crowdsourcing your bug bounty program

David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Mar 30th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //