One of the most challenging aspects of cybersecurity is that it’s a moving target of ever-expanding threats and attack surfaces. Especially as enterprises cope with a post-pandemic era of remote work and online collaboration, they are expanding services and access across hybrid multi-cloud environments. This is making IT and user ecosystems more complex and distributed – […]
Managing Customer Preferences Using Graph Databases
Managing customer preferences is one of the many aspects of managing customer journeys. Customers interact with organizations across a myriad of digital channels, and being mindful of preferences can increase the trust associated with customers. Read on for how graph databases can help manage these customer preferences. Data privacy and protection policies across geographies make it […]
In Exchange for Sharing Data, Customers Expect a Personalized Experience – Not Irrelevance
Consumers regularly receive information that is irrelevant to their current interests or situation – and they’re none too pleased. According to a recent survey commissioned by my company, 70% of consumers surveyed said they receive mistargeted information at least once a month, and 24% say they receive mistargeted information, such as inaccurate promotional emails or irrelevant […]
The Importance of a Data Governance Roadmap
A Data Governance (DG) roadmap provides a detailed plan or strategy, normally with a list of tasks that must be accomplished for improving or “maturing” a DG program. It should also list the people who are responsible for completing specific tasks. A Data Governance roadmap often includes incorporating Data Governance best practices and is typically based on […]
A Root-Cause Framework for Trans-Atlantic Data Privacy
When the United States and the European Commission together announced a new Trans-Atlantic Data Privacy Framework earlier this year, the news didn’t raise too many eyebrows. After all, there’s nothing particularly objectionable about the new framework – the goal is to “foster trans-Atlantic data flows” and address concerns about the underlying EU-U.S. Privacy Shield framework, and who […]
Fundamentals of AI Ethics
In the world of enterprise technology, AI is a fast-growing sector, with no end in sight. A recent survey by PwC found that 86% of executives expected AI to become mainstream in their organization soon. Data-driven businesses want to reap the benefits of AI implementation, including better customer relationships, more efficient business processes, and valuable marketing data. […]
Applying the Principle of Least Privilege to Multi-Cloud Environments
Organizations across all industries are adopting cloud computing models for their flexible, scalable architectures and globally available solutions. Many startups and small businesses are also benefitting from the advanced data security solutions packaged with their cloud service provider offerings, which they wouldn’t otherwise be able to afford. However, these data security solutions require careful management. Organizations don’t […]
Writing a Data Management Plan
A Data Management plan (DMP) is normally a one- or two-page summary, outlining how data will be handled during a research project, and after it has been completed. The goal of a Data Management plan is to consider the many aspects of Data Management (such as data preservation, metadata generation, and analysis) before the project begins. It […]
The Trend Toward Emphasizing Data Minimization
With GDPR being the “shot heard ’round the world,” the digital industry, the regulators, and the courts have developed and readjusted the way in which we need to think about this revolutionary body of law. Through this experience, I’ve had a few flashback analogies to Y2K: Leading up to the event, it was a period […]
Data Access Governance Is Key to Going Faster
Every day, businesses create, collect, compile, store, and share exponentially growing amounts of data. When put to use effectively, sales teams can boost revenue, marketing can improve the customer experience, HR can keep employees happy, and so on. But we all know that cyberattacks are on the rise and evolving data privacy legislation has led to the […]