This Washington Post story about a Navy contractor hacked by the Chinese government should send shivers down the spines of cybersecurity chiefs across the U.S. It’s safe to say the Navy won’t be working with that unnamed, but very embarrassed, contractor in the future. While the Navy didn’t want to give too many details, we […]
Continue ReadingOne of the key selling points for data access systems with a huge single namespace is their superior suitability for data aggregation. Data aggregation and Find capability is key for companies that want to use data to make important strategic decisions with less risk. The (black) market for Big Data This also makes systems providing […]
Continue ReadingData security is an old cat-and-mouse problem. Security is getting a lot more public attention since widely publicized breaches that affected millions of consumers. Any entity entrusted with personal data MUST be sure to have due diligence processes in place. Peaxy Aureum builds in customizable security at five different levels: None Client authentication / PKI Kerberos […]
Continue ReadingAccess control in information systems regulates what a user can do directly, and what that user’s programs are allowed to do. System administrators have to implement access control mechanisms to protect the confidentiality and integrity of applications and its data. In other words, a subject (user and process) is given access to the information (data and programs) executing […]
Continue ReadingOne of the key selling points for data access systems with a huge single namespace is their superior suitability for data aggregation. Once data has been aggregated, it is very valuable, because it allows companies to see the big picture and make important strategic decisions with less risk. The (Black) Market for Big Data This […]
Continue Reading