Quantcast
Channel: Data Security – Protegrity
Browsing all 113 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

6 Ways To Keep Data Protection From Entering An Echo Chamber (Chamber, Chamber…)

What’s an Echo Chamber got to do with Data Protection I hear you ask? Well, metaphorically, an echo chamber describes the frustration of great ideas and concepts being bounced around but never being...

View Article


Image may be NSFW.
Clik here to view.

What Are Your 2017 Data Security Predictions?

It’s December so that means it’s time to blow the dust off your crystal ball. Perhaps you prefer to read tea leaves or consult astrology charts. Maybe you gather your team around a Ouija board....

View Article


Image may be NSFW.
Clik here to view.

Privacy and Security are Key to Enabling Data-driven Healthcare

While the HIMSS Privacy and Security Forum last week in Boston featured a diverse group of healthcare professionals from payers and providers of all sizes, there was one common theme that everyone...

View Article

Image may be NSFW.
Clik here to view.

Top 10 Pieces of Advice for CIOs from CIOs in 2016

As I looked back over this year, I wanted to capture the best advice for CIOs from CIOs out of the hundreds of enlightening recommendations offered by the great IT leaders involved in the #CIOChat. My...

View Article

Image may be NSFW.
Clik here to view.

#MyDataMatters

Have you told IT? It is time that business leaders tell their IT organizations that their data matters. It does not make a difference whether you are talking about customer data, marketing data, or...

View Article


Image may be NSFW.
Clik here to view.

Pseudonymization vs. Anonymization and How They Help With GDPR

Pseudonymization and Anonymization are two distinct terms that are often confused in the data security world. With the advent of GDPR, it is important to understand the difference, since anonymized...

View Article

Image may be NSFW.
Clik here to view.

#MyDataMatters to Me

  When anthropologists try to understand an ancient culture, let’s say the Greeks, they look at the physical artifacts left behind—the tools, the utensils, etc. and try to infer insights into the prior...

View Article

Image may be NSFW.
Clik here to view.

Bankers Have Work to Do to Respond to Fintech Challengers

Bankers need to become more data centric in order to retain their right to win. Otherwise, the transformational business changes being made by others will chip away at their natural incumbent...

View Article


Image may be NSFW.
Clik here to view.

Have You Added Data Privacy Day to Your Calendar?

Many pundits have asked as technology has become increasingly capable, whether privacy is dead. Yet, each January you can add your voice to Data Privacy Day, this year on the 26th. Clearly, the voices...

View Article


Image may be NSFW.
Clik here to view.

How Should You Protect Enterprise Data?

In today’s business, protecting your data is no longer a luxury. I recall a CIO friend telling me after the Target data breach that, “Target wasn’t stupid; the business case for data security is just...

View Article

Image may be NSFW.
Clik here to view.

With Data Comes Risk, But Where There’s a Will There’s a Way to Protect It

Organizations all over the world are using data technologies to their advantage, storing, and analysing information to quickly connect dots from multiple sources and locations to spot patterns,...

View Article

Image may be NSFW.
Clik here to view.

5 Takeaways from The Privacy Engineer’s Manifesto

Recently, after connecting with Michelle Dennedy, Cisco’s Chief Privacy Officer, I took the time to read her book, The Privacy Engineer’s Manifesto. For those that will be at the RSA Conference this...

View Article

Image may be NSFW.
Clik here to view.

RSA Day One — Five Key Takeaways

It’s a real pleasure to be at RSA Conference with Protegrity this year, driving home the message that #MyDataMatters to an audience more used to talking about data security than privacy. The timing is...

View Article


Image may be NSFW.
Clik here to view.

More RSA Takeaways – Day Two

As I said yesterday, RSA is always a large event with a lot going on and day two was even busier than the first. Privacy is a hot topic this year, a theme common to many of the sessions I attended and...

View Article

Image may be NSFW.
Clik here to view.

RSA Conference — Seven Key Takeaways from Day Three

Another fantastic and busy day at RSA Conference. Clearly privacy matters to the good folks here because the stream of visitors at our booth wanting to know more about centrally managing and protecting...

View Article


Insurers Need Data to Make Transformative Changes

It is increasingly clear that insurance organizations wanting to retain their competitive advantage, need data to make transformative business changes. Data incompatibility, poor governance, and...

View Article

Silos: What Causes Them and How to Overcome Them

eventdate:January 01, 1970 - January 01, 1970:eventdateend: According to Patrick Lencioni, “Silos are nothing more than the barriers that exist between departments within an organization, causing...

View Article


You Have More Data Than You Think

eventdate:January 01, 1970 - January 01, 1970:eventdateend:The reality of our endlessly connected, always online lives is that as digital citizens we are constantly sending sensitive data about...

View Article

A Checkmark Doesn’t Mean You’re Secure

eventdate:January 01, 1970 - January 01, 1970:eventdateend:It’s 2017. Every enterprise product advertised a checkmark that says it’s “secure.” If that’s true, why are breaches still happening so...

View Article

CDOs Need to Build Their Defensive Capabilities

eventdate:January 01, 1970 - January 01, 1970:eventdateend: Chief Data Officers, as I indicated in The CDO toolkit essentials, need to be focused upon what Tom Davenport labels data defense and data...

View Article
Browsing all 113 articles
Browse latest View live