article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns.

article thumbnail

FTC Releases New Report on Big Data

Hunton Privacy

On January 6, 2015, the Federal Trade Commission released its report on big data entitled Big Data: A Tool for Inclusion or Exclusion? The majority of the report provides guidance for industry on how to mitigate the risks associated with big data when using big data for business purposes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Harter Secrest & Emery announces designation as NetDiligence-authorized Breach Coac

The Last Watchdog

Paul Greene , CIPP/US, CIPP/E, CIPM, FIP, Harter Secrest & Emery’s Privacy and Data Security practice group helps clients respond to data security incidents of all kinds. NetDiligence-authorized Breach Coach ® firms are selected based on their experience, competency, thought leadership, and industry engagement.

article thumbnail

Building the human firewall: Navigating behavioral change in security awareness and culture

IBM Big Data Hub

Organizations have spent millions developing and implementing cutting-edge technologies to bolster their defenses against such threats, and many already have security awareness campaigns, so why are we failing to stop these attacks? People also have a slow, deliberate and analytical thought process, called System 2.

article thumbnail

How to Educate Your Customers When A Data Breach Occurs

Rippleshot

We also recognize the reality that data breaches happen when gaps exist in other organization's security protocols, which can leave your own customer's sensitive data vulnerable. That's why we're also here: To help you educate your customers and members when the next big data breach happens — and what to do about it.

article thumbnail

GUEST ESSAY: Here’s how ‘WFM’ tools can boost productivity — and security — of remote workers

The Last Watchdog

Related: Turning workers into security security sensors. What’s more, WFM tools can help reinforce best security practices needed as companies increase their reliance on a remote workforce and using cloud-based software. Let’s discuss some of the reasons why WFM software can improve productivity – and security.

Security 113
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

With many employees now working remotely, securing company data isn’t as straightforward as it used to be. International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Inconsistent data regulations. If any of these are security-related, it can be a cybersecurity risk.