We live in an era where data is progressively becoming the essential and the only fuel for thriving business success. And the rapidly growing volumes of data have raised several security concerns that can’t be overlooked. Though managing the in-house data stored locally wasn’t really a tough nut to crack, cloud computing has made data visibility and […]
4 Risks of Storing Large Amounts of Unstructured Data
Click to learn more about author Gary Lyng. In 2013, the big data headline was the incredible statistic that 90% of all data in the history of the entire human race had been created in the previous two years. The amount of structured and unstructured data we’ve created was so mind-boggling that we deemed it […]
Safeguarding Data Assets: How to Prevent ML Vendors from Profiting from Your Data
Click to learn more about author Ryan Welsh. Almost any vendor doing machine learning (ML) is appropriating valued enterprise data for its own advantage; however, this is at the enterprise customer’s expense. Regardless of whether it’s a platform or an application using this technology, ML companies of all sizes want your data and are essentially using it […]
What Do Business Leaders Need to Know About Data Strategy?
Click to learn more about author Gary McCarthy. Despite significant investments in Data Management, data problems persist in many organizations. One reason for this is the view of data as a technology project rather than a corporate asset. As such, most enterprises do not have a defined Data Management plan and are therefore not able […]
Cybersecurity Tips to Prevent the Risk of Data Theft
Click to learn more about author Ben Hartwig Yahoo. Equifax. eBay. Facebook. Marriott. These companies all have one thing in common – they suffered a data breach that saw millions of users’ data get exposed. These corporate juggernauts are not alone either, as a literal “who’s who” of large organizations and governments have been the […]
A Balancing Act: Law Enforcement Cameras vs Data Privacy
Click to learn more about author Cathy Nolan. You’ve all seen it on TV – detectives and their teams trace a suspect by using video and cellphone cameras, social media, DNA analysis, fingerprint and facial recognition databases, telephone conversations, cameras mounted on police vehicles, and tracking devices on Smartphones and GPS. How accurate are these devices […]
Who is Using Your Identity? Data Theft and Data Security are Legitimate Concerns
Click to learn more about author Cathy Nolan. Identity theft is a two-step process. First, someone steals your personal information or corporate data, which is bad enough, but then the thief uses that information to impersonate you and commit fraud. If someone steals your identity it can create substantial financial risk and be extremely frustrating because […]