article thumbnail

Top Tech Conferences & Events to Add to Your Calendar in 2023

Tech Republic Security

Looking for a list of the top tech conferences and events in 2023? Explore our guide to find out which events you should add to your calendar.

Big data 123
article thumbnail

Data Privacy Week 2023: Virtual events and webinars to attend

Tech Republic Security

The National Cybersecurity Alliance's second annual Data Privacy Week is January 22-28, 2023. Learn how you can participate in virtual events. The post Data Privacy Week 2023: Virtual events and webinars to attend appeared first on TechRepublic.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

The age of Big Data is upon us. And, as more data is available for analytical purposes, more sensitive and private information is at risk. Protecting the confidentiality and integrity and of warehoused data and ensuring that access is controlled is vital to keeping that data secure. respondents.”.

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Big Data is unstructured.

article thumbnail

BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’

Security Boulevard

The post BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’ appeared first on Security Boulevard. Additionally, the BSidesSF 2021 Conference will take place on March 6 - 9, 2021 - with no cost to participate.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Phishing scams, malware, ransomware and data breaches are just some of the examples of cyberthreats that can devastate business operations and the protection of consumer information. Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942).

article thumbnail

DEF CON 29 Main Stage – Sheila A. Berta’s ‘The Unbelievable Insecurity Of The Big Data Stack’

Security Boulevard

Berta’s ‘The Unbelievable Insecurity Of The Big Data Stack’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEFCON Conference Main Stage Videos on the groups' YouTube channel. The post DEF CON 29 Main Stage – Sheila A.