No company wants to leak customer data, have intellectual property stolen, or experience business services taken offline. Those that recognize these risks are thus scrambling to hire the right people to fill their information security roles.
We’ve heard about cyberattacks against critical infrastructure sites and systems including dams, railroads, electrical grids, and even nuclear power plants. But it doesn't stop there. And it may not even begin there.
New features such as the Antimalware Scan Interface, Virtualization-Based Security and threat analytics are making Windows much more difficult to exploit, but hackers and researchers demonstrate it's still not impossible.
The Cloud Security Alliance (CSA) Big Data Working Group recently released a new handbook: The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy. This slide show looks at number 9 in the list--Granular Access Control.