Loading...
You are here:  Home  >  Articles by David Schlesinger
Latest

Ransomware – The New Cyber Protection Racket

By   /  April 19, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. Now that a number of newsworthy institutions such as hospitals, schools, and government offices, have fallen victim to what is called “Ransomware”, the media have finally noticed it. Ransomware, for those not yet familiar, is a pernicious type of cyber-attack where downloaded malware (i.e. “malware” is malicious software […]

Read More →
Latest

Data People Must Build the Bridge to Your Cyber Security People

By   /  March 29, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. Deep down in the basement of your enterprise; in the hidden and dark places amid humming servers and racks of mysterious blinking equipment resides your cyber security staff.  Pony tails, Red Bull cans, and black T-shirts identify some of the most devious and clever people in your company. […]

Read More →
Latest

Cybersecurity Weather Report

By   /  February 6, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. This will be brief, as befits a weather report. However, it will need to be a little bit more specific than the typical TV weathercast. First, beware of growing internet storm clouds approaching. These storms are caused by the heating up of state-sponsored hacking groups. Many nations are […]

Read More →
Latest

Defining Data Policy: The Iron Law of Data Protection

By   /  September 2, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Very seldom do we wake up in the morning with excitement about spending the day defining data policies. Little do we know that this can become a worthwhile activity and can eliminate myriad problems in the future for data administration and protection. While there appear to […]

Read More →
Latest

Data Protection: How Does This Figure Into Your Architecture?

By   /  July 22, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. The credit reports that your company may keep when deciding to allow credit to a new customer just might be considered confidential, especially if your billing department included judgmental remarks and evaluations. The purchase requests from your accounts payable department could potentially show which ingredients you buy […]

Read More →
Latest

Data Governance Security Classifications: Are you “in the know?”

By   /  June 17, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  1 Comment

Click here to learn more about author David Schlesinger. In any enterprise of size, there is a cyber security department. Were you to partner with this team to classify corporate data you would find them able and willing to assist you. They would arrive at the data classification meetings with policies in binders and have […]

Read More →
Latest

4 Enterprise Data Security Protocols to Safeguard Your Personal Data

By   /  April 15, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]

Read More →
Latest

Where is the Data Security Officer on the Organizational Chart?

By   /  March 11, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Let us be clear, your system users are mostly brilliant workers, having great knowledge and expertise in their lines of endeavor: scientists, accountants, shipping specialists, logistic planners, attorneys, HR and property experts all keep your enterprise running. They are not, however, experts in every other process in […]

Read More →
Latest

All Your Data Belongs To Us – Data Security in a Global Infrastructure

By   /  February 1, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]

Read More →