Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
SYS-CON.TV
For Better Security, Honesty Is the Best Policy
More data means more transactions, conversations, interactions and data now online

It goes without saying that 'Big Data' is very much a hot topic right now. In fact, there doesn't seem to be a day when we're not being spoken to, about or on the subject, and when you consider the possibilities of what Big Data provides it's not hard to see why.

It allows organizations the opportunity to perform sophisticated analysis on massive amounts of data from sources such as mobile and online transactions, social media traffic and GPS coordinates. For those firms not embracing Big Data, the pressure is on them, as they are missing out on the enormous insights and competitive advantage it can provide.

But while everyone and their dog are quick to jump on the bandwagon, what about the challenges that Big Data presents? Not so many people are brave enough to voice those and one of the key areas, which does need to be addressed, is that of security.

More data means more transactions, conversations, interactions and data now online, therefore making the incentives to cyber criminals even more appealing.

With this in mind, I decided to conduct a survey to see how seriously organizations are taking the threat of cyber security in relation to Big Data. It was nothing too scientific: a quick Internet search of the terms 'Big Data' and 'security' brought up 53,600,000 results in 0.31 seconds. On the surface this seemed a positive start, and in fact it was rather reassuring to see so many companies taking the security threats associated with Big Data so seriously. But as I dug a little deeper, my positive outlook started to wane.

First and foremost, it's important to recognize that the majority of organizations handle web security rather well through DNS traps, firewalls and other various defenses. However, the key component these manage is the external threat. What about the internal one?

Companies consider the external threat as the first line for protection and the majority share of an IT budget is often deployed there, as senior decision makers often see this as the main route of security threats. The internal security though is often featured lower down the list when it comes to budgetary priorities. IT departments are often hesitant to implement new, stricter authentication solutions as it requires user training, incurring both monetary and time costs.

This approach to security is incredibly dated and needs to be addressed. It's clear that Big Data is here to stay and therefore security along with accessibility should be at the forefront of all new projects and technologies.

The focus needs to be on the current bout of attacks and seeing how these can be prevented or at the very least made harder to execute; however, this cannot happen until owners of data start taking the threats and risk seriously. The landscape for cyber criminals has never been more appealing.

It's not just the one-off data breaches or hacker attack stories that hit the headlines, but those with far-reaching consequences that can mean reputational damage, legal liability and even financial ruin. Cyber resilience and preparedness strategies are crucial for Big Data and in order to ensure that we are prepared to meet the threats posed by cyber criminals, we need to be more honest about data breaches. From this we can learn from one-another's experiences.

About Simon Bain
Simon Bain is a recognized expert in search and security technologies. At SearchYourCloud, he helps organizations solve challenging problems – from managing and accessing data across multiple databases to securing content at rest and in transit. He holds two patents for search technologies, one for security and has five more pending.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

SOA World Latest Stories
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand usin...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and sy...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is founda...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder an...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021


SYS-CON Featured Whitepapers
Most Read This Week
ADS BY GOOGLE