Click to learn more about author Kyle McNabb. The rolling thunder of data regulations rumbles on — much to the dismay of companies and the delight of consumers. The latest rainmaker (or taker) is California’s Proposition 24. This consumer privacy ballot initiative, containing the Consumer Privacy Rights Act (CPRA), was passed on November 3, 2020, […]
Traveling in the Age of COVID-19: Big Data Is Watching
Click to learn more about author Bernard Brode. With news of the first dose of a vaccine successfully administered, it appears that we might finally be seeing the beginning of the end of the COVID-19 pandemic. However, it’s also clear that the impact of the virus — and the ways we have responded to it […]
Cyberwarfare, Ethical Hacking, and Ransomware: 2021 Predictions
Click to learn more about author Casey Ellis. Although there was an increase in cyberattacks and misinformation in 2020 as malicious actors sought to capitalize on the pandemic and presidential election, this new threat landscape also led to a business boom for crowdsourced security as organizations looked for ways to strengthen their security posture. As […]
What Is Data Preparation?
Data preparation describes the process of getting data ready for use in analytics. In the past, data preparation was a time-consuming task handled by the IT team, involving “data extraction, transformation and loading (ETL), access to data warehouses and data marts, and lots of complicated massaging and manipulation of data across other data sources,” says […]
2021 Enterprise Tech Predictions: Zero Trust, Machine Identity for AI, and Open Banking
Click to learn more about author Jasen Meece. 2020 brought massive disruptions due to COVID-19, and the abrupt shift to a remote workforce created holes in the cybersecurity landscape for malicious actors to exploit. Amid the pandemic, the harrowing spike in cyberattacks forced all enterprises, large and small, to take a closer look at potential […]
The Three Most Dangerous Ransomware Delivery Vectors: RDP, VPN, and Phishing
Click to learn more about author Gerry Grealish. Successful attacks using ransomware have proliferated so much that some security researchers are developing viable second careers as “ransomware negotiators,” bargaining with attackers who hold corporate data hostage. Creative — and convincing — ransomware approaches have flourished during the lockdown era, with industry experts noting a 72 […]
Enterprise Data Sharing: Commercially Identifiable Information
Click to learn more about author Scott Taylor. The Data Rants video blog series begins with host Scott Taylor “The Data Whisperer.” The series covers some of the most prominent questions in Data Management such as Master Data, the difference between Master Data and MDM, “truth” versus “meaning” in data, Data Quality, and so much […]
Why Is It Such a Challenge to Integrate Security into DevOps?
Click to learn more about author Anastasios Arampatzis. DevOps is transforming how organizations develop software faster. DevOps utilizes agile methodologies to integrate and streamline the software development and operations process. The result is faster time to market and a more efficient development process. However, DevOps processes are challenging the way security integrates with fast development […]
As Account Takeover Escalates, Enterprises Strengthen Identity Verification in 2021
Click to learn more about author Robert Prigge. With over 36 billion records breached in 2020, the amount of personal information on the dark web has skyrocketed, allowing cybercriminals to easily obtain the data needed to impersonate users and take over accounts. In 2021, we’ll see these enterprises take the necessary and long-overdue steps to […]
How 5G Will Impact Data and Enterprises in 2021
Click to learn more about author Vinay Ravuri. According to recent research by CCS Insight, there will be almost a quarter of a billion 5G connections worldwide by the end of 2020. They say this number is expected to triple in 2021 and grow to 3.6 billion globally by 2025. 5G will impact the way […]