Explore practical steps for securing big data installations in this 49-minute conference talk from LASCON. Learn about the security challenges associated with big data's three Vs (Velocity, Variety, and Volume) and discover how to address the potential fourth V: Vulnerability. Delve into topics such as deployment security issues, authorization methods like Kerberos, NoSQL vulnerabilities, node-to-node encryption, and threat modeling. Gain insights on creating a secure environment with a single point of access and understand the importance of implementing robust security measures in big data projects.
Big Data, Little Security - Practical Steps for Securing Big Data