article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

After a series of introductions from the audience, Garcia commenced his presentation. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. Cognitio’s Approach to Insider Threat. Cognitio will help ensure this is done.

How To 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

push IT mandates as part of cybersecurity 'sprint' FierceGovernmentIT (Today) - The Marine Corps is directing its information technology system administrators to immediately implement public key infrastructure, or PKI, encryption as part of a review of cybersecurity at the service. Privileged user authentication and PKI are.

Insurance 150
article thumbnail

Can you trust your computer?

Dataconomy

The symbiosis of security and performance presents a challenge, as stringent security measures, while bolstering resilience, can introduce overhead costs that influence system startup, throughput, and latency. The TCB’s features require initial operating system installation.

article thumbnail

10 Unbelievable Ways the CIA Is Failing at Cybersecurity

SecureWorld News

The page above reveals the bottom line of this report: "This wake-up call presents us with an opportunity to right longstanding imbalances and lapses, to reorient how we view risk, redacted.We must care as much about securing our systems as we care about running them if we are to make the necessary revolutionary change.".

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

To see why digital identity is so hard, let’s explore some specific problems that the online world presents that make identity different from the physical world 1. None of the familiar signals of the physical world are present. In real life, we do without identity systems for most things. Trust and Accountability.

Internet 102