Loading...
You are here:  Home  >  Articles by David Schlesinger  -  Page 2
Latest

Cybersecurity Weather Report

By   /  February 6, 2017  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs  /  No Comments

Click to learn more about author David Schlesinger. This will be brief, as befits a weather report. However, it will need to be a little bit more specific than the typical TV weathercast. First, beware of growing internet storm clouds approaching. These storms are caused by the heating up of state-sponsored hacking groups. Many nations are […]

Read More →
Latest

Defining Data Policy: The Iron Law of Data Protection

By   /  September 2, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Very seldom do we wake up in the morning with excitement about spending the day defining data policies. Little do we know that this can become a worthwhile activity and can eliminate myriad problems in the future for data administration and protection. While there appear to […]

Read More →
Latest

Data Protection: How Does This Figure Into Your Architecture?

By   /  July 22, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. The credit reports that your company may keep when deciding to allow credit to a new customer just might be considered confidential, especially if your billing department included judgmental remarks and evaluations. The purchase requests from your accounts payable department could potentially show which ingredients you buy […]

Read More →
Latest

Data Governance Security Classifications: Are you “in the know?”

By   /  June 17, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. In any enterprise of size, there is a cyber security department. Were you to partner with this team to classify corporate data you would find them able and willing to assist you. They would arrive at the data classification meetings with policies in binders and have […]

Read More →
Latest

4 Enterprise Data Security Protocols to Safeguard Your Personal Data

By   /  April 15, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]

Read More →
Latest

Where is the Data Security Officer on the Organizational Chart?

By   /  March 11, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Let us be clear, your system users are mostly brilliant workers, having great knowledge and expertise in their lines of endeavor: scientists, accountants, shipping specialists, logistic planners, attorneys, HR and property experts all keep your enterprise running. They are not, however, experts in every other process in […]

Read More →
Latest

All Your Data Belongs To Us – Data Security in a Global Infrastructure

By   /  February 1, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]

Read More →
We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept