Remove 2013 Remove Authentication Remove CTO Remove Systems Administration
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Working for the office of the CTO, Eddie also provides security thought leadership and vision to the Cloudera product roadmap. Authentication is addressed for the perimeter security requirements. Active Directory and Kerberos are the authentication staples within the enterprise, allowing all users to be authenticated.

Big Data 150
article thumbnail

Recorded Future Provides Awareness Into Issue of Government Credentials On The Open Web

CTOvision

They are regularly used to hold and share small working documents by programmers/developers/systems administrators as well as academics and students. These sites are web applications designed to allow users to store and share plain text. In practice, paste sites are also used as a dumping ground for stolen credentials.

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. Cognitio will help ensure this is done.

How To 150