by Angela Guess Michael Kassner recently wrote in TechRepublic, “User privacy concerns date back at least 200 years. In the 1800s, newspapers were more than a little invasive in their quest for news. In the early 1900s, wiretapping came into play with the invention of the telephone recorder. Both examples pale in comparison to what […]
4 Enterprise Data Security Protocols to Safeguard Your Personal Data
Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]
All Your Data Belongs To Us – Data Security in a Global Infrastructure
Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]
Big Brother Is Watching How You Use Big Data
Click to learn more about Ian Rowlands. There’s a legitimate concern about how data – and more specifically Big Data – is used. Powerful capabilities open the door to very sophisticated decision making that inadvertently strays into the realm of the unethical. Although I recognize the concern, I must admit that the publication of a […]