Billions of things with sensors surround people and their lives. These Internet of Things (IoT) interact with people, homes, factories, workplaces, cities, farms, and vehicles. Gartner predicts that by 2021, IoT technology will be in 95 percent of electronics for new product designs, from wearables to medical devices and beyond. IoT promises useful information, allowing […]
Cybersecurity Isn’t Going Anywhere in 2021: Expert Predictions Part One
Click to learn more about author Samantha Humphries. When reflecting on 2020, the effects of COVID-19 have touched nearly every corner of the globe, spanning continents, age groups and industries. The pandemic forced an almost overnight transformation in the way most businesses operate, particularly for those that did not already have cloud security tools in […]
A Brief History of Data Security
Data security describes the protection of digital data from a cyberattack or a data breach. A data breach is the unauthorized opening of data, typically to read or copy the information. Stolen data may contain confidential information, such as customer data, credit card numbers, or trade secrets. A cyberattack is much more aggressive. It is […]
How Big Data Enables One-to-One Marketing
Click here to learn more about Gilad David Maayan. What Is One-to-One Marketing A one-to-one marketing strategy strives to create an experience that fits the individual customer. Rather than segment customers into groups, one-to-one marketing strategies treat each customer individually. This is similar to how sales representatives remember details about each customer, like date of […]
Two Real-World Scenarios That Illustrate PCI Scope
Click to learn more about author Rob Chapman. When I find myself discussing PCI compliance, it always seems like the conversation goes in one direction. Whether I’m speaking with business leaders, IT executives, or the team responsible for deploying technology, everyone primarily just wants to know that a certain solution will check all the boxes […]
Tips for Better Cloud Expense Management
Click to learn more about author Jay Chapel. The term “cloud expense management” has been co-opted by many parties, from those selling employee expense management software hosted in the cloud, to telecom expense management software (TEM), to IT expense management software, to cloud cost management software which focuses on SaaS, IaaS, and/or PaaS services. For […]
Why Your Business Is Targeted by Cyber Attackers and What to Do About Data Security
Click to learn more about author Ashok Sharma. Here’s news that may shock you about cyberattacks. No, it’s highly unlikely that your business is being targeted. Your data security is probably just weak. A Clark School (University of Maryland) study found that, on average, there is a hacker attack every 39 seconds, and these attacks affect […]
The 12 Days of Data Management
Click to learn more about author Scott Taylor. The Data Rants video blog series begins with host Scott Taylor “The Data Whisperer.” The series covers some of the most prominent questions in Data Management such as Master Data, the difference between Master Data and MDM, “truth” versus “meaning” in data, Data Quality, and so much […]
Accelerating Digital Risk and Data Security 2021 Trends
Click to learn more about author Jonathan Reiber. In this blog, I’ll note five trends that will accelerate digital risk or emerge as vital conditions for managing digital risk over the coming year. 5G and IoT will increase the speed of attacks and enable more actors to conduct a wider range of operations against targets […]
Metadata Management and Analytics: What is the Intersection?
Metadata Management implies a set of activities, which administer data for better usage and outcomes. Thus, this practice involves establishing stringent roles, responsibilities, policies, and processes to ensure that data-driven information is available, accessible, sharable, and maintainable across an organization for the best analysis and application of such information in daily business. In that sense, Metadata […]