SaaS platforms exploded in the last few years for excellent reasons: scalability, cost, accessibility, and flexibility. But like any explosion, it left some messes in its wake. For IT and security teams, in particular, the increasing number of solutions in use created a seemingly never-ending need to add users, remove users, or change permissions every […]
The Trend Toward Emphasizing Data Minimization
With GDPR being the “shot heard ’round the world,” the digital industry, the regulators, and the courts have developed and readjusted the way in which we need to think about this revolutionary body of law. Through this experience, I’ve had a few flashback analogies to Y2K: Leading up to the event, it was a period […]
Data Access Governance Is Key to Going Faster
Every day, businesses create, collect, compile, store, and share exponentially growing amounts of data. When put to use effectively, sales teams can boost revenue, marketing can improve the customer experience, HR can keep employees happy, and so on. But we all know that cyberattacks are on the rise and evolving data privacy legislation has led to the […]
Prioritizing Cybersecurity at the Leadership Level
Week after week, month after month, shareholder cyber lawsuits hit the news. Capital One settles for $190 million. A class-action lawsuit was filed against Ultimate Kronos Group for alleged negligence regarding a ransomware attack, identifying a poor cybersecurity system as the root problem. These two news items in recent months underscore the risks companies face in their ongoing war […]
3 Common Zero Trust Challenges – and How to Overcome Them
According to IBM, the average cost of a breach was $1.76 million less at organizations with a mature zero trust approach than those without. It’s understandable why this verify-first, trust-later mentality has gained steam over the last few years. And the reality is, that organizations don’t have much of a choice. The world saw an alarming […]
How IoT Security Affects Data Monetization
Understanding how IoT security affects data monetization is crucial for businesses to effectively trade intel without the risk of online threats. Today, almost every business shares important data, but not all businesses attempt to generate revenue from the shared information. According to McKinsey & Co., high-performing companies that wish to grow tend to adopt data […]
Open-Source Cloud Databases: Security Best Practices
A cloud database runs on a cloud computing platform that delivers it to users as a service. Cloud services offer various cloud databases, including SQL and NoSQL databases. Here are the two main cloud database deployment models: Use a virtual machine (VM) to run your databases on the cloud privately Purchase access to a database […]
Data Architecture Challenges
The more your business grows, the more complex your business’s Data Architecture becomes. Enterprise Data Architecture challenges abound – from the beginning and throughout the journey. Data has now become the lifeblood of any business, and business data cannot survive without a solid underlying Data Architecture. Data helps businesses to identify risks and opportunities, understand […]
How Data Privacy Laws Impact Companies’ Approach to Cloud Security
Globally, organizations are churning out data in massive volumes for a plethora of reasons. Data enables organizations to speed up innovation, take business-critical decisions confidently, get deep consumer insights, and use all that information to stay ahead of their competitors. However, where does all that data go? They can’t possibly keep all that data stored […]
Data Governance at the Edge of the Cloud
We are living in turbulent times. Online security has always been an area of concern; however, with recent global events, the world we now live in has become increasingly cloud-centric. With that, I’ve long believed that for most large cloud platform providers offering managed services, such as document editing and storage, email services and calendar […]