CHAPTER 4: INSIDER THREAT, BIG DATA AND THE CLOUD

The cloud computing model may be a wonderful system when it works; a nightmare when it fails.*Jamais Cascio73

Data protection in general, and in particular protection against the insider, has been rendered more difficult by technologies such as the Cloud and big data.

Increasingly, governmental and private organizations move toward consolidation of their information technology resources. In many cases, this means centralization, the dissolving of corporate-owned boundaries, the movement of data into the Cloud, and the evolution of ‘big data’. It doesn’t take long to understand that this consolidation of information leads to a higher target density – one of infinitely higher value to an insider ...

Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.