Loading...
You are here:  Home  >  'data security'
Latest

Data Governance and Lessons Learned

By   /  February 4, 2016  /  Conference and Webinar Communities, Data Articles | Data Science, Business Intelligence, & More, Data Conference Communities - Learn, Share, Review, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Articles, Education Resources For Use & Management of Data, Enterprise Data World Conference Community  /  No Comments

dglessons_020116

Instituting a comprehensive Data Governance program is not an easy task for any enterprise, for one as large as Deutsche Telekom the enormity of the task cannot be understated. Data professionals understand the competitive advantages that properly implemented Data Governance can produce; they also understand the many pitfalls, challenges, and eventual insights to be gained. […]

Read More →
Latest

A Look at NIST’s Framework for Fighting Cybercrime

By   /  February 4, 2016  /  Data Daily | Data News, Data Education, Data Governance & Data Quality | News & Articles, Data Governance News, Education Resources For Use & Management of Data, Enterprise Information Management, Information Management News  /  No Comments

ni

by Angela Guess John Weathington recently wrote in TechRepublic, “If your organization wants to incorporate data science into its cybersecurity program, you may not know where to start. Fortunately, thanks to an agency of the US Department of Commerce, you don’t have to approach this with a blank slate. When considering a data science solution […]

Read More →
Latest

All Your Data Belongs To Us – Data Security in a Global Infrastructure

By   /  February 1, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

David Schlesinger

Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]

Read More →
Latest

American Express’s Use of Big Data and Machine Learning

By   /  January 18, 2016  /  Data Daily | Data News, Data Education, Education Resources For Use & Management of Data, Smart Data News, Smart Data News, Articles, & Education  /  No Comments

ae

by Angela Guess Bernard Marr writes in Data Informed, “American Express handles more than 25 percent of credit card activity in the United States and, in 2014, surpassed handling $1 trillion in transactions. The company interacts with people on both sides of transactions: millions of businesses and millions of buyers. So it’s no surprise then […]

Read More →
Latest

4 Ways CIOs Can Minimize the Impact of a Data Breach

By   /  January 12, 2016  /  Data Daily | Data News, Data Education, Data Governance & Data Quality | News & Articles, Data Governance News, Education Resources For Use & Management of Data, Enterprise Information Management, Information Management News  /  No Comments

breach

by Angela Guess Andrew Froehlich recently wrote in InformationWeek, “Several high-profile data breach cases from last year have put security front-and-center for many CIOs and IT professionals I work with on a daily basis. It’s also the one area CIOs tend to lose the most sleep over. While no organization can be completely protected, strategies […]

Read More →
Latest

3 Data Security Problem Areas to Watch

By   /  December 10, 2015  /  Business Intelligence News, Business Intelligence News, Articles, & Education, Data Daily | Data News, Data Education, Education Resources For Use & Management of Data, Enterprise Information Management, Information Management News  /  No Comments

aiim

by Angela Guess David Roe reports in CMSwire, “More than half of organizations surveyed experienced a data–related incident in the past year, according to new research from AIIM (the Association for Information and Image Management). Of the 16 percent who reported a data breach, half attributed the breach to hacking and half cited staff negligence. […]

Read More →
Latest

Securely Breaking Down Barriers Between Information Stores

By   /  December 9, 2015  /  Data Daily | Data News, Data Education, Education Resources For Use & Management of Data, Enterprise Information Management, Information Management News  /  No Comments

wall

by Angela Guess Paul Terry writes in CTO Vision, “Digital companies have taken the lead in this next phase of data-driven decision-making, but it’s now extending across more kinds of organizations and more areas within organizations. Smart CTOs recognize the wealth of data trapped in silos across their business. That could include: Metrics tracking customer […]

Read More →
Latest

New Report: Corporate Governance in the Age of Cyber Risks

By   /  December 2, 2015  /  Business Intelligence News, Business Intelligence News, Articles, & Education, Data Daily | Data News, Data Education, Data Governance & Data Quality | News & Articles, Data Governance News, Education Resources For Use & Management of Data  /  No Comments

whar

by Angela Guess Knowledge at Wharton, in collaboration of RANE, recently wrote, “Corporate boardrooms are waking up to the encroaching, systemic threat of cybersecurity risks. But while awareness is growing — more than 80% of boards now discuss cybersecurity at most, if not all, of their meetings — many directors simply are not sure if […]

Read More →
Latest

The Role of Machine Learning in Cybersecurity

By   /  November 19, 2015  /  Data Daily | Data News, Data Education, Education Resources For Use & Management of Data, Smart Data News, Smart Data News, Articles, & Education  /  No Comments

Building security x300

by Angela Guess Alex Woodie recently wrote in Datanami, “It may surprise the casual observer, but machine learning is not widely leveraged in the IT security field at this time. Notwithstanding credit card fraud detection systems and network device makers that are using advanced analytics, the systems that automate common security activities in practically every […]

Read More →
Latest

What Can Data Governance Do to Protect Personal Data?

By   /  November 4, 2015  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

cathy nolan new

by Cathy Nolan I know you are all busy creating or approving standardized definitions, consolidating data, checking for data quality, and all the many activities of Data Governance. But I want to introduce one more task, and it might be the most important thing you can do for your organization—keeping your company’s PII (Personally Identifiable […]

Read More →