article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

As the VP of InfoSec and Engineering for Gazzang prior to its acquisition by Cloudera, Eddie architected and implemented secure and compliant Big Data infrastructures for customers in the financial services, healthcare and public sector industries to meet PCI, HIPAA, FERPA, FISMA and EU data security requirements.

Big Data 150
article thumbnail

Should Data Centers Think?

Cloud Musings

According to industry research firm IDC, organizations will spend an additional $142.8 In support of trust, TAP Security follows layered security and deep defense principles to provide transparent encryption and decryption, as well as fine-grained access authorization, based on a variety of authentication mechanisms and assurance levels.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FBI: Credential Stuffing Leads to Millions in Fraudulent Transfers

SecureWorld News

Financial industry targeted the most by credential stuffing attacks. Some of the credentials belonged to company leadership, system administrators, and other employees with privileged access.". Use anomaly detection tools that identify an unusual increase in traffic and failed authentication attempts.".

Banking 55
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

push IT mandates as part of cybersecurity 'sprint' FierceGovernmentIT (Today) - The Marine Corps is directing its information technology system administrators to immediately implement public key infrastructure, or PKI, encryption as part of a review of cybersecurity at the service. Privileged user authentication and PKI are.

Insurance 150
article thumbnail

Things To Understand To Prevent Data Loss

Galido

Historically, most firms have made cybersecurity investment decisions, especially the implementation of data loss mechanisms by adhering to industry best practices, without necessarily developing a detailed understanding of their overall cyber risk first. Cyber Security 101.

Data 81
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0,

article thumbnail

Can you trust your computer?

Dataconomy

This key is typically generated during chip manufacturing and plays a central role in ensuring the authenticity of the system Secure input/output (InO) : Secure Input/Output mechanisms, also known as InO, ensure that data interactions between the computer and external sources are secure.