Topic "Data Security"

Top 3 Data Security KPIs for 2017

It’s that time of year, publications and social are flooded with numerous articles on 2017 security predictions, trends and priorities. Publications such as eWeek, SC Magazine and Dark Reading have predictions ranging from the obvious to the obscure. I find these articles interesting and entertaining; but I would love to see score cards year-to-year on... more

Data Privacy Implications Under GDPR

First of all, what is GDPR? GDPR is the European Union’s General Data Protection Regulation Act, which supersedes the 1995 Data Privacy Protection guideline. It is the Nuclear Option for the citizenry when its data is being used by non-authorized entities against their explicit wishes. As a consequence; automatic, vague opt-ins checked based on hyperlinks... more

How Mature is your Organization’s Security Program?

Perimeter defense is dead since there is no longer a perimeter. An organization’s data exists everywhere, on premise, in the cloud, and on multiple devices. Availability of data to be accessed from anywhere, any device and any location in the world, allows for maximum productivity, enables business to be conducted from anywhere, and improves customer... more

Who is Accountable for a Breach to Your Data Integration Environment?

Enterprise Data usage has never been higher than it is today; and data usage is continuing to grow as Data fueled applications are the norm. The variety of sources, the volume, the transformations and prolific use of Data makes Data-Integration a critical ‘hub’ of enterprise data that enables critical business processes. In this Golden Age... more

Part 2: The Importance of Test Data Management for Development and Operations

In my previous blog on The Importance of Test Data Management for DevOps Part 1, I discussed how Test Data Management tools complement test management and automation tools to support DevOps. I discussed the following key capabilities of Test Data Management that fills the gaps left by test automation solutions: Sensitive Data Protection Test data... more

Part 1: The Importance of Test Data Management for Development and Operations

The adoption of agile software development has prompted the tighter collaboration between development and operations (DevOps) – a practice that enables the implementation of agile. DevOps enables more frequent, timely, higher quality software delivery by deploying automated tools for test, release, configuration management and continuous integration, while fostering collaboration across the various teams involved in... more

Securing the Data Footprint

Increasingly, the ability to effectively secure corporate and customer information and assets is a conversation that has moved from technologists up to C-level executives and the board. At the same time, approaches to corporate security are quickly evolving beyond the traditional infrastructure-based approach. When I talk to CIOs and CISOs about security, they share a... more

Data Security Survey by Informatica, Scale Ventures and Ponemon

When it comes to sensitive data, what you don’t know will hurt you; and ignorance is not bliss. Informatica, Scale Ventures and Ponemon Institute concluded their survey on data security, titled “Data Breaches and Sensitive Data Risk”. This follows Informatica’s report last year on “The State of Data Intelligence“. The survey reveals considerable anxiety around... more

“Where Is My Data?” (And other terrifying questions facing security professionals)

Survey Results: What issues are most top of mind for CISOs As a security professional, I can attest that the lifeblood of any company is the sensitive data they process. To be useful this data needs to be connected to other applications, mashed-up with other data sources, and presented to a wide variety of mobile... more