Transforming IT
Showing results for 
Search instead for 
Do you mean 

Five Immutable Laws of Big Data Security

TSchreider on ‎11-20-2013 02:17 PM

Big Data Graphic.jpgToday, private and public enterprises alike face aggressive and persistent attempts to steal their data.  Companies who have adopted Big Data make for an attractive target. Hackers know that Big Data means valuable information will be consumerized and made available on social media sites, cloud platforms and all manner of mobility devices, all historically easy targets to compromise.  To hackers, Big Data means big opportunity. They can steal more data than ever before with the same or less effort.


Hackers also know that a company’s rush to adopt Big Data inhibits them from deploying adequate security controls.  After all, what self-respecting hacker wouldn't love a large central repository of tasty data with lax security controls?


These conditions have led to the following widely believed immutable laws of protecting Big Data.


  1. You’re just a custodian – if you don’t own the data, you can’t control its security.


  2. Too big will fail – large databases can never be secure.


  3. If you have to ask, you can’t afford it – protecting big data is overly expensive.


  4. You will never see them coming – your data will always land in the hands of the wrong people.


  5. Dodge, stoop and obfuscate – you will need to be evasive about the extent of your data breach.


Are these really immutable laws that we must live with? Or simply self-filing prophesies that we have the power to change?


At the HP Discover 2013 Conference in Barcelona, Spain on Thursday, December 12th at 9:50 am I will show attendees how they can change these immutable laws in their favor by applying HP’s Big Data Protection Services.


Watch for my follow up blog on how HP helps clients change these immutable laws of Big Data security. Or better yet, join me in Barcelona, Spain in December at HP Discover to hear firsthand.

About the Author


Tari is a Distinguished Technologist with 30 years of IT and cyber security experience. He is dual board certified in information security/business continuity and is responsible for a wide range of management and technology consulting services encompassing information security, disaster recovery, privacy, and risk management. His problem-solving skills, knowledge of various technology platforms, compliance statutes, industries, as well as his experience in deploying defense-in-depth and InfoSec Program solution architectures is commonly applied when advising CIOs/CISOs as well as leveraged in numerous HP client engagements throughout the world. Tari has designed, built, and managed some of the world’s largest InfoSec programs allowing them to defend against even the most aggressive attackers.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all