buy lipitor online
  • JUser: :_load: Unable to load user with ID: 700
  • JUser: :_load: Unable to load user with ID: 716
Hurwitz & Associates - Insight is Action

Hurwitz & Associates Blog

As thought leaders in the IT industry, Hurwitz blogs are a wealth of knowledge and insight into trending technologies.

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Login
    Login Login form
Subscribe to this list via RSS Blog posts tagged in Big Data Security

Understanding the Business Implications of the GDPR

Posted by on in Uncategorized
With the growing importance of data analytics, businesses are discovering that they must walk a fine line  in how they handle and manage customer data. Data privacy both  from both regulatory and reputational standpoints is requiring companies to move cautiously. The latest round of regulations, including the EU’s GDPR, comes with stiff financial penalties for those that fail to comply. Companies that fail to adequately prepare for the GDPR risk incurring fines of up to 4 percent of their annual revenue. As a result, organizations around the world are scrambling to address the new rules before the GDPR goes into effect...
Last modified on
Hits: 1510
Continue reading 0 Comments
         I had a very interesting discussion the other day with an executive for a technology company. He had just come from a presentation about the Internet of Things (IoT) market. The presenter projected that the market would be valued at around $7 Trillion market within the next decade. What did I think about this projection? Is it correct? Is this the true size of the market? Now, as a disclaimer, I don’t do market sizing. I assume that those smart people who figure out how big or small a market will be use sound judgment. However, I don’t think that...
Last modified on
Hits: 4955
Continue reading 1 Comment

Rethinking the Approach to Fraud

Posted by on in Security
If you think fraud is not your issue, think again; 1 in 13 people will be impacted by fraud. Therefore businesses that hope to maintain the trust of their customers must be able to address fraud in a consistent and predictable way.  If executed well, corporations, government, and non-profits companies need to protect their constituents by being both accountable and prepared. To achieve this aim requires more than simply implementing a set of point solutions, employing individual subject matter expertise, and reviewing an IT governance playbook.  My colleague, Dan Kirsch and I recently attended an IBM meeting where they announced their...
Last modified on
Hits: 11637
Continue reading 0 Comments

The Emergence of Big Data Security Intelligence

Posted by on in Security
What's Driving Big Data Security Intelligence? There is a new generation of security offerings that can anticipate threats and prevent them in real-time.  This new generation of offerings is emerging because of an increase level of risk.  Traditionally, security systems have worked by collecting and analyzing logs and then setting alerts to trigger action when activity falls outside of a specified pattern.  This approach  no longer satisfies the security needs of many organizations.  There are an increasing number of  newer threats, such as Advanced Persistent Threats (APTs) that are designed to look like normal system traffic and often do not trigger...
Last modified on
Hits: 4717
Continue reading 0 Comments