Data Protection January 28, 2016 Football and a Crystal Ball: Data Privacy Predictions for 2016 4 min read - Here are seven predictions on what 2016 will bring for data privacy, especially as it relates to security, potential breaches and more.
Data Protection December 21, 2015 How to Stop Data From Leaving the Building 4 min read - IBM and Forrester Research have teamed up to provide some video guidance for enterprises facing the challenges surrounding data protection.
Data Protection November 25, 2015 Big Data Opportunities Need Big Data Security 3 min read - The adoption of big data analytics is a rapidly growing trend. If you want to reap the benefits of these platforms, you need comprehensive data security.
Intelligence & Analytics November 2, 2015 The Use Case for Big Data and Security Analytics: An Interview With Ben Wuest 3 min read - IBM Security's Ben Wuest discusses how organizations can implement big data and analytics as part of their security intelligence solutions.
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
Data Protection October 29, 2015 Big Data Protection: Off by Itself or a Member of the Family? 2 min read - Protecting your big data information and platforms requires a collaborative effort between different teams and security controls.
Data Protection October 22, 2015 Be the Power Behind the Throne: Create a Secure Environment for Big Data 4 min read - By getting ahead of the big data trend, you can become the power behind the throne and enable business success, all while keeping that data secure.
Data Protection September 30, 2015 The Dollars and Cents of Protecting Your Data 3 min read - A new survey highlighted that organizations using IBM Security Guardium for their data security were able to find success with security and compliance.
August 18, 2015 Insecure Configuration of MongoDB, Other Databases Could Be Leaking Information 2 min read - A recent report suggested poor configurations of MongoDB, Redis and similar database products may be exposing data to cybercriminals.
June 17, 2015 Log Management Is a Key Use Case for Big Data Solutions, Survey Shows 2 min read - Log management for security-related purposes has become one of the biggest use cases for big data solutions, a survey by the SANS Institute shows.