↧
Getting Started with Cloudera’s Cybersecurity Solution
A quick conversation with most Chief Information Security Officers (CISOs) reveals they understand they need to modernize their security architecture and the correct answer is to adopt a machine...
View ArticleHadoop Delegation Tokens Explained
Apache Hadoop’s security was designed and implemented around 2009, and has been stabilizing since then. However, due to a lack of documentation around this area, it’s hard to understand or debug when...
View Article