• Tue. May 12th, 2026

Christina Antonelli

Connecting the World, Technology in Time

Information Security

  • Home
  • Application of big data technology in enterprise information security management

Application of big data technology in enterprise information security management

The BDT framework The BDT framework is a collection of tools and techniques for processing large-scale data42,43. In this study, a comprehensive BDT framework based on the Hadoop ecosystem is…

6 Cyber Security Providers For 2025

By SentinelOne January 22, 2025 Businesses are familiar with how frequent cyber threats have become. These threats are now more complex and damaging, meaning that companies have to change their…

Ferris State’s Master of Information Security and Intelligence program among nation’s elite in US News and World Report rankings

Jan. 22, 2025 Ferris State University’s Information Security and Intelligence program stands among the best according to rankings released by U.S. News and World Report. BIG RAPIDS, Mich. — Ferris…

Second Biden cyber executive order directs agency action on fed security, AI, space

A draft cybersecurity executive order would tackle cyber defenses in locations ranging from outer space to the U.S. federal bureaucracy to its contractors, and address security risks embedded in subjects…

GoDaddy to Settle FTC Charges of Inadequate Security Practices

The Federal Trade Commission (FTC) said Wednesday (Jan. 15) that a proposed settlement order will require web hosting company GoDaddy to improve its information security program. The regulator alleged in…

Australian Government Agencies Failing to Keep Up With Cyber Security Change

More Australian government agencies failed to meet the required levels of cyber security maturity in 2024 than in 2023, according to an assessment by the Australian Signals Directorate. The ASD…