TDWI Articles

Security and Privacy


Data Digest: Spark v. Hadoop, Cloud Security, and Big Data Frameworks Rundown

Comparing big data frameworks, plus how to secure your cloud computing environment.

Divide and Control: Roles vs. Rules in Access Management

Role-based access control is the norm in many companies, but binding users to statically defined roles is an inflexible approach. Attribute-based control offers more opportunity and flexibility to get security right.

Data Digest: Machine Learning, BI in the 21st Century, and Analytics Battles Privacy

Can a robot perform analytics on big data, plus using modern tools to manage unstructured big data and data analytics vs. consumer privacy.

How to Increase Your BI Program's Value (Part 2 of 2)

Data is your enterprise's most valuable asset. Here are three ways to ensure you get the most from it.

Q&A: Look to Data-Centric Security to Truly Protect Data

A security expert from Teradata explains how and why to focus security specifically on your data.

Q&A: Data-Centric Security Wraps Data in Layers of Protection

A security expert explains why wrapping layers of security around your data is a must in today's world of constant data breaches -- and is seldom done properly.

Data Digest: Hadoop and Spark, Personal Clouds, Cyberattack Defenses

A look at how Hadoop and Spark do things differently (and extremely well), plus why sophisticated attacks require sophyisticated defenses and are personal clouds a good policy?

Data Digest: Big Data Requirements, Big Data Project Success, and Fighting Cyberattacks wtih Threat Intelligence

Use open source and open architecture to get the most out of big data, plus why big data projects are increasingly successful but sill not reaching their full potential. Also: preventing cyberattacks.

TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.