Category Archives: Cybersecurity

Is Apache Hadoop Ready for Security?

Categories: Cybersecurity Open Source Software

In 2008, the number of internet-connected devices surpassed the number of people on the planet and Facebook overtook MySpace as the most popular social network. At the time, few people grasped the impact that these rapidly expanding digital networks would have on both national and cyber security. This was also the year I first used…

Read More

Join Apache Spot (Incubating): The Community Dedicated to Ending Cyber Threats

Categories: Cybersecurity Open Source Software

At this point we’ve all witnessed the seemingly endless parade of headlines regarding yet another cyber attack. The latest news came September 22, 2016 from Yahoo! and includes the staggering revelation that “at least 500 million accounts were stolen” in, wait for it, “late 2014”. Those 500M+ accounts can be added to the already hefty…

Read More

Cloudera/MeriTalk Study Reveals Data Analytics Key to Negotiating Federal Cybersecurity

Categories: Cybersecurity

Cybersecurity is top of mind for security professionals across both the public and private sector, with the federal government alone in 2015 experiencing more than 60,000 cybersecurity breaches. Cyber breaches expose potentially sensitive information and can adversely impact both personal lives as well as materially impact businesses, all while costing organizations millions of dollars. It’s…

Read More

Amplifying Data Sharing as a Force Multiplier for Government Agencies

Categories: Cybersecurity

As I mentioned in my last post, Cloudera has made significant progress in recent years around ensuring data safety and security no matter the location for government agencies. One opportunity for securing data less commonly addressed than crypto or guns/gates/guards is the problem of data movement. Every time data is moved, copied, or replicated a…

Read More

Ensuring Data Safety and Security for Government Agencies

Categories: Cybersecurity

We are in the midst of a technological shift. The number of devices, data from those devices, and security threats both to those devices and the networks that connect them, have all increased so exponentially that agency CIOs and CISOs are suffering from overload. Despite the fact that they have tools in place to help…

Read More