CHAPTER 4: INSIDER THREAT, BIG DATA AND THE CLOUD

The cloud computing model may be a wonderful system when it works; a nightmare when it fails.*Jamais Cascio73

Data protection in general, and in particular protection against the insider, has been rendered more difficult by technologies such as the Cloud and big data.

Increasingly, governmental and private organizations move toward consolidation of their information technology resources. In many cases, this means centralization, the dissolving of corporate-owned boundaries, the movement of data into the Cloud, and the evolution of ‘big data’. It doesn’t take long to understand that this consolidation of information leads to a higher target density – one of infinitely higher value to an insider ...

Get Insider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.