Data Security in a Data-Driven World (Part 3): Get the Quick Win!
In Part 1 of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In Part 2, we...
View ArticleWith Data Comes Responsibility, With Breaches Come Blame
CISOs and data security professionals struggling with the burden of ever increasing amounts of data, cyber threats and privacy regulations are looking for a simpler and more effective way to meet...
View ArticleOne for all and all for one…
Never mind Dumas, do you own a Swiss Army knife, a Leatherman or a universal remote? Multipurpose makes sense right? While one-size-fits-all implies a compromise, having the right tool for the right...
View ArticleAre you going to be the next Yahoo?
Are you going to be the next Yahoo? Listen to what CIOs have to say Several years ago, I was at a major tech event. A person that I did not know came up and asked me and the person I was talking to for...
View ArticleWhat is the Difference between Tokenization and Encryption?
More and more organizations are moving from encryption to tokenization, recognizing that it is a more secure, more flexible and more cost-effective approach – they realize that tokenization goes well...
View ArticleHow Can Data Security Tip the Scales in Privilege vs. Protection?
For any organization that requires the storage and use of sensitive data for operational functions, there will always be a tug of war between access and security. Importantly, the principle of Least...
View ArticleHow safe is your SaaS implementation from a data loss?
Even with the growth in adoption of cloud based software-as-a-service (SaaS), concerns about data security have remained. While breaches have been infrequent at SaaS vendors, questions persist about...
View ArticleCustomers Say, “Lose Our Data, Lose Our Business”
Customers have come to rely on brands known for taking security seriously and conversely, are less likely to trust brands that have had known security breaches, according to Return Path CISO Dennis...
View ArticleCFOs: Do You Protect Your Corporate Data?
Grant Thornton finds that many of you do This post originally appeared on The Innovation Enterprise blog. I admit it, I am a Star Trek fan. I love especially when Captain Piccard says to his team ‘make...
View ArticleData Security in a Data-Driven World (Part 2): Follow the Money!
In Part I of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In this second...
View ArticleData Security in a Data-Driven World (Part 3): Get the Quick Win!
In Part 1 of this blog series, we introduced the topic of boundaries, how traditional silo-oriented thinking is arguably the biggest barrier to implementing comprehensive data security. In Part 2, we...
View ArticleWith Data Comes Responsibility, With Breaches Come Blame
CISOs and data security professionals struggling with the burden of ever increasing amounts of data, cyber threats and privacy regulations are looking for a simpler and more effective way to meet...
View ArticleOne for all and all for one…
Never mind Dumas, do you own a Swiss Army knife, a Leatherman or a universal remote? Multipurpose makes sense right? While one-size-fits-all implies a compromise, having the right tool for the right...
View ArticleAre you going to be the next Yahoo?
Are you going to be the next Yahoo? Listen to what CIOs have to say Several years ago, I was at a major tech event. A person that I did not know came up and asked me and the person I was talking to for...
View ArticleWhat is the Difference between Tokenization and Encryption?
More and more organizations are moving from encryption to tokenization, recognizing that it is a more secure, more flexible and more cost-effective approach – they realize that tokenization goes well...
View ArticleHow Can Data Security Tip the Scales in Privilege vs. Protection?
For any organization that requires the storage and use of sensitive data for operational functions, there will always be a tug of war between access and security. Importantly, the principle of Least...
View ArticleCMOs Seeking Customer Intimacy Need to Protect Customer Data
Digital disruption changes the customer experience In this era of digital disruption, customer experience rules. The President of Hyatt hotels for example claims, “Customers today buy experiences not...
View ArticleCFOs: Do You Protect Your Corporate Data?
Grant Thornton finds that many of you do This post originally appeared on The Innovation Enterprise blog. I admit it, I am a Star Trek fan. I love especially when Captain Piccard says to his team ‘make...
View ArticleHow CIOs Achieve Relevance Within Their Businesses
If you ask CIOs today about their challenges, several things make their list, not the least the fact that things are changing a lot faster these days. One CIO said to me in exasperation, “Things are...
View Article“The law requires that organisations take appropriate measures to keep...
Sadly there’s yet another major company in the news with headlines about a data breach that we would all dread to see about our own organisation. Breaches can come internally and externally and...
View Article