Use big data to improve cybersecurity, build a solid recommendation system, and identify requirements for better security analytics.
- By Quint Turner
- October 13, 2016
There are many lessons from the Great Yahoo Data Breach, including six steps your enterprise should take to minimize risks or respond when a breach is identified.
- By Brian J. Dooley
- October 10, 2016
How the wrong data strategy can miss new customers, creating an enterprise data lake, and why one man believes open source is the key to real security.
- By Quint Turner
- October 7, 2016
Cloud’s impact on data integration, avoiding big data roadblocks, and the security benefits of self-healing systems.
- By Quint Turner
- October 6, 2016
Developing a long-term big data strategy, identifying cyberattack vulnerabilities, and the growing demand for data engineers.
- By Quint Turner
- October 5, 2016
Why infrastructure trumps analytics, getting insight more easily from IoT data, and how to protect yourself from ransomware.
- By Quint Turner
- October 4, 2016
Learn why the NFL is embracing data analytics, best practices for data integration and databases in the cloud, and how to prevent cloud security breaches.
- By Quint Turner
- September 30, 2016
Best practices for cloud security, the basics of using anomaly detection for cybersecurity, and methods for judging the value of data.
- By Quint Turner
- September 23, 2016