Quantcast
Channel: security – Bigstep Blog
Browsing all 19 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Keeping your big data safe and secure

An organisation’s big data is one of the most powerful assets it holds. With the right computing infrastructure to process it all, big data is full of insight that can add value in a variety of ways to...

View Article



Image may be NSFW.
Clik here to view.

Don’t let security concerns impact use of big data

Security is an on-going issue in IT, with data breaches and how to prevent them, top of the agenda for many CIOs. This has been exacerbated by the rise of big data. Business lines are keen to make the...

View Article

Image may be NSFW.
Clik here to view.

The Hot and Cold Relationship Between CIOs and Hadoop

Do CIOs love Hadoop, hate it, or love to hate it? It turns out, the answer is: a little of all three. While hiring Hadoop talent at unprecedented rates and paying hefty sums to get those workers, CIOs...

View Article

Image may be NSFW.
Clik here to view.

Expert Interview with Paul F. Roberts on Cyber Security and Big Data

Paul F. Roberts, founder and editor in chief of The Security Ledger, has a deep passion for cyber security – especially as it relates to the Internet of Things. In fact, he started his independent news...

View Article

Image may be NSFW.
Clik here to view.

Thwarting Server-to-Server Communications Spoofing

Your business name is Bob Knows Best with a domain name of BobKnowsBest.com. Your customers receive an email saying that there is a problem with their account at Bob Knows Best, directing them to visit...

View Article


Image may be NSFW.
Clik here to view.

Is Big Data the Answer to Your Security Questions?

The year 2014 became known as the Year of the Hacker, even before it mercifully came to an end. In fact, many security experts predict that the trend will continue into this year and beyond. Isn’t it...

View Article

Image may be NSFW.
Clik here to view.

How to Provide Enterprise-Level Security to Cloud-Based Apps

Cloud-based apps are a must-have these days. Every business from your news channel to your bank to your video streaming service offers robust, highly functional mobile apps for customers to take...

View Article

Image may be NSFW.
Clik here to view.

The Top 8 Things to Know About Implementing BYOD Policies

The jury is in, and they have a verdict: whether you like it or not, BYOD is here and here to stay. Now that the ruling is out of the way, it’s time to set up solid policies to assure that the influx...

View Article


Image may be NSFW.
Clik here to view.

Is the Tech Worker Labor Shortage Threatening Your IT Security?

For several years, rumors have abounded that there is a shortage of IT workers. Some say there is; others say there isn’t. But the reported shortage of qualified IT security personnel isn’t a false...

View Article


Image may be NSFW.
Clik here to view.

What is the Next Generation Firewall? How Can You Choose One?

In the market for a new firewall? The next generation firewall (NGFW) is a distinct improvement over the previous generation for this era of Internet threats. Most businesses opt for a physical...

View Article

Image may be NSFW.
Clik here to view.

4 Takeaways from the Recent Data Breach of US Government Security Agency

Today is not a good day to be an employee of the US federal government. One of the worst data breaches in history has compromised the private, sensitive information of at least four million, but...

View Article

Image may be NSFW.
Clik here to view.

Health-Related Data a Top Target for Hackers

Since September 2009, there have been 1,282 data breaches involving the healthcare community, according to the official figures of the US government. During these attacks, the private health...

View Article

Image may be NSFW.
Clik here to view.

Malvertizing: What It is and What You Need to Know to Keep Your Network Secure

What happens when you wrap a zero day attack into a drive by download attack and load it into a Flash-based advertisement? The result is a malvertizement, and the instances of these threats has risen...

View Article


Image may be NSFW.
Clik here to view.

5 Cyber Security Mistakes That Led to the Dow Jones Security Breach

In early October, publisher and financial news and information firm Dow Jones & Company announced that it was apparently the latest victim of hackers trying to steal sensitive consumer information....

View Article

Image may be NSFW.
Clik here to view.

Hactivism: What It is and How You Can Avoid Becoming a Target

New years are new beginnings. In our personal lives, that usually means rethinking and recommitting to goals like physical fitness, financial prosperity, and personal betterment in the form of more...

View Article


Image may be NSFW.
Clik here to view.

Ransomware: What You Need to Know to Secure Your Data Today

Each year, major cyber security companies and other industry experts release their predictions for the year ahead. These predictions include what attacks they expect to see most frequently, as well as...

View Article

Image may be NSFW.
Clik here to view.

The Pink Elephant in the Room: How IT Ignores Blatant Security Issues, Even...

What would happen if you completely ignored your car maintenance or home maintenance? What if you bought a car and drove it for years with no oil changes, no tire balancing and rotation, and never...

View Article


Image may be NSFW.
Clik here to view.

4 Cyber Security Trends You Never Saw Coming

Most of the cyber attacks and data breaches you hear about are of the garden variety. The Sony hack, for example, and data breaches at Ashley Madison are the same types of threats we’re used to seeing....

View Article

Image may be NSFW.
Clik here to view.

Why the Future of Cyber Security Lies in Big Data & Artificial Intelligence

Just a cursory look around the world of cyber security is enough to deduce: we aren’t doing a good enough job. The cyber criminal organization Carbanak whipped up a concoction of malware that caused...

View Article
Browsing all 19 articles
Browse latest View live




Latest Images