Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » big data

Articles Tagged with ''big data''

From RSA: Big Data is a Transformative Solution to Security Challenges

February 26, 2013

In his opening keynote at RSA Conference 2013, Art Coviello,Executive Vice President of EMC Corporationand Executive Chairman of RSA, The Security Division of EMC® addressed a crowd about the ways that Big Data is transforming the security industry, information technology, business and society.


Read More

What is Big Data?

Part 1 of 4
Steve Van Till
Steve Van Till
February 12, 2013
Big Data is the newest Big Buzzword, and it’s rolling across the IT landscape like the fast-paced “cloud” buzz-storm that preceded it.
Read More

9 Ongoing Trends for Surveillance Analytics

zalud-2016-200px.jpg
Bill Zalud
February 1, 2013
The video analytics drums are beating louder these days. But now may finally be the time when technology advances, security-and-beyond enterprise-centric applications, IT’s big data notion and smarter systems integration are trending to real, cost-effective benefits.
Read More

IBM Launches Big Data Security Initiative

February 1, 2013

IBM is looking at using big data analysis to enhance corporate and homeland security, and detect and prevent cyber attacks.


Read More

How Security Can Add Value and Mitigate Risk in 2013

diane-2016-200.jpg
Diane Ritchey
December 1, 2012
Here’s a sure-bet, good news 2013 prediction: No more political ads on TV, at least for a while. Still, next year will hold plenty of ups and downs for enterprise security leaders, which include innovations that will help you to reduce enterprise risk. The Tonight Show’s Jay Leno and CEO Gary Shapiro know. Researcher Michela Menting and economist Bart van Ark have their perspectives on the near future as does Gartner Fellow David Cearley.
Read More

Big Data in Motion – Real Time Analytic Solutions for 21st Century Challenges

Alex Philp
August 28, 2012
In the decade since 9/11, the United States has invested enormous resources into protecting our critical infrastructure from asymmetrical attacks, such as car bombs and hijacked airplanes. The problem is that our most vital facilities – pipelines, ports, refineries and power plants – are also vulnerable and difficult to secure due to their remote locations.
Read More

The Importance of Big Data

August 1, 2012
Big Data Is…. Big! It also poses big risks and big opportunities. As you know, there has been a lot written lately about cloud computing, and due to the platform’s design, cloud computing security. Securing the cloud is the work of technical experts at places like Google, Amazon, NSA and the DOD. And that cloud is being secured more each minute through both better procurement policy and technology.
Read More
Security News -- Cloud Computing

Cloud Computing More Accepted, Less Scary in 2012

June 22, 2012

Cloud computing isn't a dark cloud any longer, as only 3% of survey takers think it's too risky of a venture.


Read More
Previous 1 2 3 4 5 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing