Top 10 Best Public DNS Servers for 2024
Comforte AG: Big Data Analytics – Security and Compliance Challenges in 2019
![](/sites/default/files/styles/cropper_main_image/public/migration_image/ID%20423%20Comforte%20AG%20Big%20Data%20Analytics%20%E2%80%93%20Security%20and%20Compliance%20Challenges%20in%202019.jpeg.webp?itok=fsJuI5G8)
There is an ever-increasing number of people, devices and sensors that generate, communicate and share data via the global internet. Analysing this data can help organizations to develop new products, improve their efficiency and effectiveness, as well as to make better decisions. However, there are increasing concerns over the trustworthiness of this data as well as security and compliance challenges over the way that it is used. This report describes the challenges of using Big Data in ways that are secure, compliant and ethical and how a data centric approach to security is essential to meeting these challenges. Societal concerns over how data is being acquired and used are leading to increasingly tough regulations governing how organizations can acquire, store and use data. In addition to existing regulations such as HIPAA, recent examples are the EU GDPR (General Data Protection Regulation) and the CCPA (California Consumer Privacy Act of 2018). GDPR imposes a much tougher regulatory framework that affects organizations worldwide that hold or process personal data relating to residents in the European Union. In order to meet the obligations imposed by these laws, it is essential that organizations implement good data governance as well as data centric security controls over how they acquire, store, process, and analyse data.
Recommended Content
Trending Content
Critical NHS Hospital Appointments Cancelled After Synnovis Cyber Attack
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Hackers Race Off With F1 Data Following FIA Cyber Attack
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Palo Alto Networks: Bridging the Gap between Cloud Security and the SOC
![](https://em360tech.com/sites/default/files/styles/default_logo/public/2023-12/palo%20alto%20networks%20png%20logo%20.png.webp?itok=McSAzr_K)
Top 10 Best DCIM Software Solutions for 2024
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)