Click to learn more about author Brad Thies. In what’s become a frighteningly frequent occurrence, another unsecured Amazon Web Services (AWS) S3 bucket has jeopardized hundreds of millions of customers’ personal data. Companies share security responsibilities with their Cloud service providers. While AWS and other CSPs must provide identity and access management tools, among others, they […]
Data Risk in 2018: Data Management and Data Integrity Necessities
Click to learn more about author John Felahi. Once again, businesses sat up and took notice of a number massive consumer information leaks over the past year. The data breach headlines of 2017 were led by Yahoo, Uber, Arby’s, and Equifax, to name just a few. These events exposed various levels of personal and identifiable […]
DevOps, DataOps, and Data Repositories
Click to learn more about author Paul Stanton. There is a disconnect between the goals of DevOps, and the realities of working with relational data. Relational databases are core to many enterprise applications, and the Gartner Group projects that 80% of new projects will rely on relational data through 2020 (available courtesy of Microsoft here). […]
Radware Survey Finds Nearly Half of Companies Have Suffered a Data Breach in the Past Year
by Angela Guess A recent press release reports, “Radware, a leading provider of cyber security and application delivery solutions, released a new study today titled Radware Research: Web Application Security in a Digitally Connected World. The report takes an in-depth look into how organizations protect their web applications, and identifies clear gaps in security among […]
So, What is GDPR, and Why Should Your Customers Care?
Click to learn more about author Richard Macaskill. We all know GDPR is on the way and, to date, most of the articles have been industry-focused, talking about the affect it will have on companies and organizations that gather, hold and process data. I recently wrote about why DBAs should care about it, and advised that […]
How Blockchain Can be Used to Secure Sensitive Data Storage
Click to learn more about author Mary Ann Callahan. Data Security is no longer a luxury or an afterthought. With so much of our private, personal, and sensitive information being stored and transmitted online, tight security and privacy are now necessities for everyone. But, just as more of our lives are going online, we are […]
Use Artificial Intelligence to Streamline GDPR Compliance
It’s the morning of May 18, 2018 and you arrive at your desk to find a message from a former job applicant in Germany asking for an inventory of all Personally Identifiable Information (PII) you have for him, and a request to delete all his information. There’s also a notice from IT saying they have […]
Appoint a Data Protection Officer to Ensure Compliance with the GDPR
Click to learn more about author Stuart Tarmy. When is the Best Time to Appoint a DPO? What are Their Key Responsibilities? As many companies are now aware, the European Union (EU) General Data Protection Regulation (GDPR) becomes effective on May 25th 2018, and will have a significant and possibly devastating impact on all companies that […]
Pricchaa Releases Office 365 Data Breach Risk Diagnostic Tool
by Angela Guess According to a recent press release, “Pricchaa Inc. announced that it has released a complimentary Office 365 Data Risk Breach Diagnostic Tool. Pricchaa offers solutions to detect and protect sensitive information when large volumes of data in a variety of formats move at a very high speed. While Office 365 is more […]
Presidential Policy Directive — United States Cyber Incident Coordination
by Angela Guess Yesterday, the White House distributed its Presidential Policy Directive for responding to any significant cyber incident affecting the nation, such as a federal data breach. The release states, “The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity. However, the same infrastructure that […]