Continue in 2 seconds

10 Best Practices in Big Data -- Endpoint Input Validation/Filtering

Published
  • September 01 2016, 6:30am EDT
Slide 1 of 12
10 Best Practices in Big Data -- Endpoint Input Validation/Filtering
The popularity of Bring Your Own Devices practices has greatly increased the threat level to big data, according to the Cloud Security Alliance report on the “100 Best Practices in Big Data Security and Privacy”. Users should ensure that the source of data is not malicious and—if it is—should filter malicious input materials generated by that source. Here are the Alliance’s recommended practices to achieve the best-possible input validation/filtering results.


next