Welcome!

Big Data Security. Who's looking out for your big data?

David Tishgart

Subscribe to David Tishgart: eMailAlertsEmail Alerts
Get David Tishgart via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by David Tishgart

Wrapping up a year of impressive growth and product innovation, Gazzang, the Linux data security company, today made its 2013 predictions covering emerging trends in big data, the cloud and open source technology adoption. “Buoyed by increasing adoption of and trust in cloud technologies, big data will move out of the shadows and start to creep into the boardroom,” said Larry Warnock, CEO of Gazzang. “While big data is already a conversation topic at most enterprises, it’s traditionally been relegated to IT and development projects. Next year, these organizations will start to see big data as a solution for driving better business intelligence, product innovation and customer service.” Additional Gazzang predictions include: The first significant big data company acquisitions will happen, signaling a shift in focus from proof-of-concept projects to high-business-val... (more)

Sh*t IT Security Guys Say

One of the classic Internet memes from earlier this year were rash of Shit ___ Say videos. You may remember this all started with the strangely popular Shit Girls Say video, which now boasts over 17 million views. I guess I was feeling a little nostalgic this morning when I came into work, so I thought I'd share this IT Security entry from February. No Big Data implications here other than that this represents yet another in the millions of online videos that are shared daily. Please enjoy Sh*t IT Security Guys Say, and let me know what you think. ... (more)

Why Data Breaches Occur and How You Can Lessen Their Impact

One of the dirty little secrets about security: there is simply no way to make your company impervious to a data breach. It's almost a statistical certainty that you will, at some point or another, be hit with a security scenario that you're not prepared for. That's why security today is as much about damage control as it is about breach avoidance. Consider the following: Most breaches aren't that hard to execute Attacks on corporate networks and data occur at alarming frequency. You might think that's because attackers have become more sophisticated, but that's not necessarily t... (more)

Why Data Breaches Occur and How You Can Lessen Their Impact | Part 2

Last week, I covered some of the reasons data breaches happen. Let's shift gears now and look at what can be done to reduce their impact. To be perfectly clear, there’s no magic bullet for security. There are, however, a few small things that can make a big difference in every organization. Encrypt everything This may sound difficult, inconvenient and expensive, but it’s really not. In fact, once implemented, most encryption solutions are so turn-key that you’re likely to forget they’re running in the background. Plus, can you really put a price on the protection of your corporate... (more)

Big Data and Privacy

Remember when being “sent to your room” was considered one the harshest punishments a parent could dole out? I certainly hated it, and I’m pretty sure my kids don’t like it much either. For whatever reason, this form of punishment – the ultimate act of isolation – seems to have stood the test of time. It’s also a great way to quickly introduce your children to the seven stages of grief: Stunned silence Screaming Kicking Pouting Kicking again Wailing Acceptance But in today’s hyper-connected, always-on society, the whole notion of isolation is quickly becoming obsolete. So much so t... (more)