Remove Big data Remove Information Security Remove InfoSec
article thumbnail

Security BSides London 2021 – Ben Caller’s ‘Big Data Lake, Big Data Leak

Security Boulevard

Our thanks to Security BSides London for publishing their tremendous videos from the Security BSides London 2021 Conference on the organization’s YouTube channel. The post Security BSides London 2021 – Ben Caller’s ‘Big Data Lake, Big Data Leak appeared first on Security Boulevard.

Big data 143
article thumbnail

DEF CON 29 Main Stage – Sheila A. Berta’s ‘The Unbelievable Insecurity Of The Big Data Stack’

Security Boulevard

Berta’s ‘The Unbelievable Insecurity Of The Big Data Stack’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel. The post DEF CON 29 Main Stage – Sheila A.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kingston Technology Wins Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

a world leader in memory products and technology solutions, is proud to announce it has won the following Global InfoSec Awards for its encrypted USB solutions family from Cyber Defense Magazine (CDM), the industry’s leading electronic information magazine: Data Loss Prevention Market Leader. “We About CDM InfoSec Awards.

InfoSec 40
article thumbnail

Unleashing the Power of a Security Data Lake

SecureWorld News

The concept of a Security Data Lake, a type of Data Lake explicitly designed for information security, has not received much attention yet. However, this is not your ordinary data storage solution. It can potentially bring a company's security to the next level.

article thumbnail

Standards development - a tough, risky business

Notice Bored

Although we already have considerable discretion over which information security controls are being managed within our ISO/IEC 27001 I nformation S ecurity M anagement S ystems today, an unfortunate side-effect of standardisation, harmonisation, adoption, accreditation and certification is substantial inertia in the system as a whole.

InfoSec 66
article thumbnail

The business case for security strategy and architecture

Notice Bored

c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.); Defining a coherent sequence or matrix of strategic initiatives (projects, investments, business and technology changes.) Bringing clarity and direction (focus!)

article thumbnail

DEF CON 29 Main Stage – Orange Tsai’s ‘ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server’

Security Boulevard

The post DEF CON 29 Main Stage – Orange Tsai’s ‘ProxyLogon Just Tip of the Iceberg, New Attack Surface on Exchange Server’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel.