Category Archives: Cybersecurity

Cloudera/MeriTalk Study Reveals Data Analytics Key to Negotiating Federal Cybersecurity

Categories: Cybersecurity

Cybersecurity is top of mind for security professionals across both the public and private sector, with the federal government alone in 2015 experiencing more than 60,000 cybersecurity breaches. Cyber breaches expose potentially sensitive information and can adversely impact both personal lives as well as materially impact businesses, all while costing organizations millions of dollars. It’s…

Read More

Amplifying Data Sharing as a Force Multiplier for Government Agencies

Categories: Cybersecurity

As I mentioned in my last post, Cloudera has made significant progress in recent years around ensuring data safety and security no matter the location for government agencies. One opportunity for securing data less commonly addressed than crypto or guns/gates/guards is the problem of data movement. Every time data is moved, copied, or replicated a…

Read More

Ensuring Data Safety and Security for Government Agencies

Categories: Cybersecurity

We are in the midst of a technological shift. The number of devices, data from those devices, and security threats both to those devices and the networks that connect them, have all increased so exponentially that agency CIOs and CISOs are suffering from overload. Despite the fact that they have tools in place to help…

Read More

Are you ready for the Cybersecurity Renaissance?

Categories: Cybersecurity

I’m Rocky DeStefano Cloudera’s Subject Matter Expert for cybersecurity and for the majority of the last two decades I’ve explored in depth both the security vendor space and the operational side of information security for organizations in the Federal and enterprise space. My primary goal has been to detect malicious activity faster, with more accuracy…

Read More

Are you prepared for the cybersecurity renaissance? Join us tomorrow to find out more

Categories: Cybersecurity Events

We are in the midst of a fundamental shift in the way in which organizations protect themselves from the modern adversary. Traditional rules based cybersecurity applications of the past are not able to protect organizations in the new mobile, social, and hyper-connected world they now operate within. However, the convergence of big data technology, analytic…

Read More