(Photo: Shutterstock)
(Illustration: Shutterstock)
Lisa Donnan, left, Jenny Menna, and Renee Tarun address the 2016 Cyber Security Brainstorm on Sept. 13, 2016. (Photo: MeriTalk)
(Image: Shutterstock)

The Cloud Security Alliance published a list of the 100 Best Practices in Big Data Security and Privacy to help big data service providers strengthen their infrastructures as the amount of data rapidly grows. The list offers 10 solutions for each of the 10 biggest challenges in big data security and privacy. Check out our condensed list, presenting one recommendation for each challenge.






[…]

FBI Director James Comey, shown last year, discusses the agency's relationship with the private sector.  (Photo: Flickr)
(Photo: Shutterstock)
(Photo: Shutterstock)

The National Institute of Standards and Technology aims to improve communication with non-Federal systems containing Federal data through updates to its guidelines “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations,” also referred to as 800-171.






[…]

(Illustration: Shutterstock)

A cybersecurity professional in Arlington, Va., who protects the Pentagon, makes 72% less than someone doing similar work in Minneapolis. A study from Indeed compared salaries from information security specialists in 15 cities.






[…]

(Photo: Shutterstock)
(Photo: Shutterstock)

Government employees who attended the hacking conventions of the past had a pretty hard time remaining unnoticed, as many hosted “Spot the Fed” games that rewarded attendees for outing Federal employees. Today’s hacking conventions, like Black Hat and Defcon that took place earlier this month, are creating a much more collaborative environment.






[…]

1 2 3 5