Big Data in the Enterprise: An Introduction

WatchIT
Show More

Related videos

Enterprise Security Landscape: Risks and Controls
Part of the Series: WatchIT Auditing Collection
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise…
Enterprise Security Landscape
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director…
Big Data: Good for the Customer Not Just the Business
Part of the Series: Business Intelligence Collection
An important lesson learned about Big Data is that collecting and storing data may be the easier part of the job, analyzing and utilizing the data, well, that's the challenging task. It's become abundantly clear, that today's organizations need to work through the challenges and come full circle with their…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Effective Data Management
How much data do we create every day? Well, experts estimate that a massive 2.5 quintillion bytes of data is amassed on a daily basis and that 90% of the world's global data glut is the product of only the last 2 years! In order for this accumulated data to…
Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…
Master Data Management and Cloud Computing
There may be nothing more essential to both private and public sector organizations today than the master data they hold regarding their customers, products, suppliers, employees and finances. It's of vital importance that this data and information be accurate and managed correctly. The advent of Cloud Computing brings with it…
Emerging IT Trends - And Their Impact on Security Policies
Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the…
Incident Response Plans - Advice and Best Practices
CIOs, IT and business leaders must be proactive in their planning and always ready to respond when it comes to cyber threats and attacks. Security experts agree that attacks are no longer a matter of "if" but are now clearly a matter of "when" for organizations today. A critical element…
Extensible Business Reporting Language
The Extensible Business Reporting Language, or XBRL, is a language that enables the electronic communication of financial data. XBRL has truly revolutionized business financial reporting around the globe. XBRL offers an opportunity for IT professionals to closely align with their business colleagues; working jointly to solve reporting problems and issues…
Insider Threats: Avoiding the Next Snowden
Not since the days of Daniel Ellsberg and the Pentagon Papers have we seen the likes of a classified material leak of the size and significance executed by the now infamous NSA contractor, Eric Snowden. This devastating loss of sensitive information has served as yet another wake-up call to organizations…
The Role of Technology in Counter-Terrorism
Through the tragedy of 9/11, the Boston Marathon bombings and the recent NSA surveillance controversy, we have become aware of the critical nature of technology in the detection and investigation of terrorist threats and actions today. From biometrics and communication intercepts to airport security and chemical weapons detection, technology is…