Slide 1 of 12
10 Best Practices in Big Data -- Endpoint Input Validation/Filtering
The popularity of Bring Your Own Devices practices has greatly increased the threat level to big data, according to the Cloud Security Alliance report on the “100 Best Practices in Big Data Security and Privacy”. Users should ensure that the source of data is not malicious and—if it is—should filter malicious input materials generated by that source. Here are the Alliance’s recommended practices to achieve the best-possible input validation/filtering results.