Speed and Security: Are they Incompatible for Big Data Posted on 30 March 2017 by Sharon Ginga in Enterprise Security Analytics and speed are key to extract value from big data but the attributes that define big data, also contribute to security vulnerabilities. Encrypting your… Leaks and Breaches, and Hacks, Oh My! Posted on 07 April 2011 by Gemalto in Corporate To borrow another sentiment from the Wizard of Oz, we're not in Kansas anymore. It seems the last six months have been filled with news… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.