How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...

comforte AG Announces Seamless Integration of Data Security with Apache Kafka

| | big data, SBN News
Wiesbaden, Germany - 17 June, 2019 - comforte AG has announced new integration capabilities for Apache Kafka with the latest release of their Enterprise Data Protection Suite. These new capabilities enable organizations ...

comforte AG Gives Apache Kafka a Big Data Security Boost

| | big data, SBN News
Wiesbaden, Germany - 17 June, 2019 - comforte AG, a leading provider of enterprise data security and digital payments solutions, has announced new integration capabilities for Apache Kafka with the latest release ...
software asset management

Check Point Adds Big Data Analytics Platform for Cybersecurity

Check Point Software Technologies this week launched a big data analytics platform providing analytics to give cybersecurity professionals visibility into every application and system they have deployed on the Amazon Web Services ...
Security Boulevard
A Torrid Affair: Data Analytics and Data Protection

A Torrid Affair: Data Analytics and Data Protection

Friends with Benefits or Deadlocked Foes? With the rapid expansion of data analytics frameworks and technologies, the ability to mine and gain customer insights from datasets has never been easier. Creative analytics ...

What is Big Data?

If you want an effective User and Entity Behavior Analytics (UEBA) solution, you’re going to need to leverage Big Data analytics. Coined in 2001, Gartner’s Big Data definition refers to “high-volume, high-velocity ...

What is Big Data?

If you want an effective User and Entity Behavior Analytics (UEBA) solution, you’re going to... The post What is Big Data? appeared first on Gurucul ...
How to End the Tug of War Between Data Analytics and Data Security

How to End the Tug of War Between Data Analytics and Data Security

Data analysts want access to large volumes of data because, generally speaking, the bigger the sample size, the more accurate the predictions. One of the biggest thorns in the side of data ...
Brute Force Attacks on IoT – Here to Stay?

Brute Force Attacks on IoT – Here to Stay?

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, ...

How Many Reports Does It Take to Make Sense of Your Data?

We get a lot of briefing requests from market research firms. On this day, we were briefing a research director of a global firm on our Gurucul Fraud Analytics platform. We were ...
Loading...