A cursory look at some of the numbers on data breaches can be misleading. For instance, while there were just 400 reported cases of data breaches over the course of 2014, compared to 500 per year from 2010 through 2013, this is not indicative of a better cyber security environment. Experts believe that the trend is toward fewer worse incidents and more moderately severe data breaches. Furthermore, attacks are growing in terms of sophistication and funding, meaning many breaches are not even discovered, or are discovered only after the fact. Here are the realities regarding today’s data breaches. Continue Reading
For all of the buzz about big data and analytics, most of the real world use cases you read about involve marketing. It’s true: big data is powerful for marketing, allowing them to finely tune their targeting and messaging efforts. But that’s just a tiny fraction of the potential for big data. From operational improvements to safeguarding your business against the next recession, big data has a lot to offer aside from marketing. Here are just a few of those ways. Continue Reading
We are pleased to announce that the highest-performance Hadoop distribution is now available on the Bigstep platform.
The Cloud Industry Forum (CIF) and Cloud Pro have announced the Shortlist for the UK Cloud Awards 2016. Bigstep is competing for the ”Most Innovative Enterprise Product of the Year” Award. We are honored to have been nominated for this award along with three exceptional companies: Okta, Pink Telephone Company and Thoughtonomy.
This is our second application for the UK Cloud Awards, an event which celebrates the leading cloud suppliers, technologies and projects in the UK. Our first application brought us a prize we cherish to this day – Newcomer of the Year 2014.
Here is part of the application that brought us this year’s nomination: Continue Reading
Most of the cyber attacks and data breaches you hear about are of the garden variety. The Sony hack, for example, and data breaches at Ashley Madison are the same types of threats we’re used to seeing. Unfortunately, many businesses are still vulnerable to these types of attacks because it’s difficult to prove that cyber security actually produces a measurable ROI. But beware, those without adequate IT security, because the next generation of threats is already on the way. Continue Reading