article thumbnail

IBM Claims Advances In Fully Homomorphic Encryption (and I’m claiming advances in an anti-gravity device)

CTOvision

– 23 Dec 2013: IBM (NYSE: IBM ) inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security. That said, I am providing IBM’s release below, and plan on tracking this and other reporting on this topic: From: [link]. ARMONK, N.Y.

IBM 293
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

14 essential book recommendations by and for IT leaders

CIO Business Intelligence

For grasping artificial intelligence Sherry Comes, former CTO at IBM Watson and current managing director of conversational AI at PwC, thinks you need to read Age of Invisible Machines: A Practical Guide to Creating a Hyperautomated Ecosystem of Intelligent Digital Workers (Wiley, 2022) by Robb Wilson. CTO and co-founder of Digibee.

Devops 130
article thumbnail

Cloudera Strengthens Hadoop Security with Acquisition of Gazzang: Builds on additional community efforts to deliver end-to-end security offering

CTOvision

Later, more and more security related capabilities were added, including better access control, authentication, auditing, and data provenance. Cloudera is continuing to invest broadly in the open source community to support and accelerate security features into project Rhino—an open source effort founded by Intel in early 2013.

Security 272
article thumbnail

Recorded Future Provides Awareness Into Issue of Government Credentials On The Open Web

CTOvision

Analysis and additional reporting by the government indicates that many of these agencies do not require multi-factor authentication, meaning lost credentials are a particularly risky threat in those cases.

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. In recent years, multiple high-profile, high-impact breaches have raised awareness of the cyber threat.

How To 150
article thumbnail

DARPA Official: Human-Robot Teams Key to Disaster Response

CTOvision

Launched in October 2012, the DARPA Robotics Challenge has held two of three competitions -– a virtual event in June 2013 and a live two-day event held Dec. The plan is to make the tasks more difficult and more authentic than they were in the trials, he said. “My WASHINGTON, Feb. 20-21 at the Homestead-Miami Speedway in Florida.

CTO Hire 282