Big Data is talking. Are you listening?
Perhaps you’ve heard that the next new thing in IT is ‘big data’ and concluded that the hype-cycle machine is turning out another attention-getter. I’m not big on predicting paradigm shifts, so I won’t in this case. But I will say that if you’re an IT professional, you ignore big data at your peril. I believe this one is all it’s cracked up to be and more. Read more. Download whitepaper »
Given today’s threat environment, security teams now realize that they must assume their IT environments are subject to periodic compromise. Gone are the days when preventive measures to secure the perimeter or trying to detect malware problems using signature match technologies were enough. New practices based on an understanding of the phases of an attack, continuous threat monitoring, and rapid attack detection and remediation are required. Find out more. Download whitepaper »
Big Data techniques are seen as increasingly valuable by organisations seeking to maximize their security intelligence. Security teams that leverage big data security analytics can cut the time taken for threat detection and investigation from days to minutes. But the gap is widening….read on. Download whitepaper »
Sign up now »
Key mobile trends and analysis on how performance testers must change their testing methodologies to ensure they are accounting for the changes caused by mobile usage. Download today.
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Police urge banks to install ATM chip technology
- Twitter aims to become safer with two-step sign-in
- Prevent a hack attack with Twitter's new two-factor authentication
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave