article thumbnail

The Data Lakehouse Post 1 – My Database Wishlist – A Rant

Security Boulevard

In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has […].

article thumbnail

How the new Spirion-Thales partnership enables sensitive-data-centric encryption

Thales Cloud Protection & Licensing

How the new Spirion-Thales partnership enables sensitive-data-centric encryption. Getting everything booked was surprisingly uneventful; that is, until I tried to reserve a kennel for my two dogs. Everything is booked solid or outrageously expensive. Transparent Data Protection. Thu, 06/30/2022 - 05:43.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to SLO Your SOC Right? More SRE Wisdom for Your SOC!

Anton on Security

all quotes are from the SRE book here) So? Read the SLO chapter in the book for a full example, but they have an example of a service where the reliability was too high. The SRE book reminds us that “good metrics” may need to be balanced with other metrics, rather than blindly pushed up. OK, what’s an SLI? How is it bad?

Phishing 189
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

Data Philosophy and Technology Combine for Better Endpoint Security

Security Boulevard

When Ackoff wrote his article, computing technology was at the cusp of data and information. With the advent of advanced tools like big data analytics and artificial intelligence, one might make a bold statement that today, computing technology straddles the gap between information and knowledge.

article thumbnail

MY TAKE: Six-figure GDPR privacy fines reinforce business case for advanced SIEM, UEBA tools

The Last Watchdog

A few key takeaways: Sticks & carrots Poor security practices at British Airways resulted in hackers pilfering credit card information, names, addresses, travel booking details and logins for some 500,000 airline customers. For a full drill down on our meeting, give a listen to the accompanying podcast.

Big data 153
article thumbnail

Hush – This Data Is Secret

CyberSecurity Insiders

Is There Ever Too Much Data? As a security practitioner, you know that businesses are fuelled not only by people but by data. Years ago, the phrase “Big Data” was a new, innovative way to gain a business advantage. Now, big data is the norm.