The many layers of NoSQL big data security
Posted on 16 August 2016 by
Let’s explore why NoSQL database users most commonly choose to apply big data security at either the file system or the application level of the database.
Posted on 16 August 2016 by
Let’s explore why NoSQL database users most commonly choose to apply big data security at either the file system or the application level of the database.
Posted on 09 August 2016 by
Find out how Brexit has complicated data protection considerations for financial services companies and other international companies in the UK and why this makes encryption that much more important.
Posted on 21 March 2016 by
Sadly, cyber security is an area where Batman has room for improvement. Here are three good examples.
Posted on 16 March 2016 by
Learn from Home Depot’s $172 million data breach, ensure against data breaches and implement steps so you can protect your data.
Posted on 02 March 2016 by
The Chatham House report, Cyber Security at Civil Nuclear Facilities, highlights two areas that could be addressed using technology already deployed in many private sector organisations.
Posted on 22 February 2016 by
— Photo Credit: Apple iPhone via Kārlis Dambrāns cc. As I recently covered on this blog, the privacy vs. security debate heated up last week as a result of Apple CEO Tim Cook opposing a U.S. court order to create software that would enable the FBI to access data on the iPhone of San Bernadino […]