Sign up | Login with →


8 Suggestions for Every Data Protection Strategy [VIDEO]

February 12, 2014 by Daniel Casarin

Data Protection strategy.

Jason Buffington of Enterprise Strategy Group recently put together a video targeted to IT Pros who would like to learn about the steps necessary in ensuring organizational recover-ability. In the video, are eight suggestions to consider as part of a data protection strategy.[read more]

Data Privacy Issues Can't Be Overlooked

January 10, 2014 by Roman Vladimirov

Privacy policy.

Businesses in all sectors are finding more uses for their big data on what can seem like an everyday basis. For example, in a recent blog post by Forrester Research, many of the world's biggest brands, ranging from BMW and John Deere to the Starwood network of hotels, are pursuing initiatives allowing them to essentially sell data to their customers or clients to help bolster their users' experiences, in a variety of ways.[read more]

Managing Cyber Security Threats from Inside

December 30, 2013 by April Sage

Cyber security threats.

The number of annual security incidents caused by insider threats is increasing. In The CERT Guide to Insider Threats, Capelli et al write, “Insider threats are an intriguing and complex problem. Some assert that they are the most significant threat faced by organizations today.”[read more]

The Control of Personal Data by Large Powerful Corporations [VIDEO]

December 9, 2013 by Mark van Rijmenam

Control of personal data.

Nicholas Carr, Pulitzer Prize Finalist for his book, "The Shallows: What the Internet Is Doing to Our Brains," discusses the dangers that occur when large companies such as Twitter, Facebook and Google own the majority of personal data.[read more]

Who Has My Personal Data?

December 1, 2013 by Evan Levy

Where is your personal data?

It’s really too bad that companies with copies of my personal information aren’t required to contact me to update and confirm the accuracy of all of my personal details. That would ensure that all of the specialized big data analytics that are being used to improve my purchase experiences were accurate.[read more]

Living Without a Trace of Big Data

November 26, 2013 by MIKE20 Governance Association

I’ve watched over a number of months as major digital providers across handsets, telecommunications, internet services and virtually every other integrated offering have one by one described how they provide information to various governments. So, I set myself a challenge: could I live for one day leaving a data footprint as light as that of a citizen of the real 1984?[read more]

Our Privacy is Currency and We are Giving It Away

November 20, 2013 by MIKE20 Governance Association

How much information is being shared about you?

We rarely consider the data privacy implications of our brave new data world, which prompted me to ask why we are so concerned about the government accessing data that in many instances we voluntarily gave to companies like Google, which provides free services (not counting the money we do pay for our mobile phone plans and to our Internet service providers) that are not really free because we pay for them with our privacy.[read more]


How Big Data Will Change People Management Forever

November 19, 2013 by Bernard Marr

The Big Data Guru column.

Big data will have an impact in so many business areas. In this post I look at how big data is used in people management (or HR) settings to change the measurement, analysis and management of people forever. I believe big data can make a real impact in the area of people management, but only if companies invest in building the big data and analytics skills and expertise now.[read more]

The Department of Commerce Should Establish an Office of Data Innovation

September 30, 2013 by Daniel Castro

Photo credit:  Tim Evanson

The Department of Commerce should proactively search for more opportunities to unlock the potential of data-driven innovation. The importance of data to the U.S. economy continues to grow. For example, in the United States the economic value from health care data is estimated at $300 billion annually.[read more]

4 Million Patient Records Stolen in Second Largest HIPAA Data Breach

September 4, 2013 by April Sage

Advocate Health Care marks the second largest HIPAA data breach since the breach notification rule was implemented in 2009, losing more than 4 million patient records in a theft of four unencrypted computers. The data included personally identifiable patient information as well as clinical data, including diagnoses and health insurance information.[read more]

No Encryption or BAAs: Keep PHI Off Unsecure Clouds

August 1, 2013 by April Sage

While Google Drive is a classic example of what cloud computing can provide, it cannot meet the security requirements desired by the HIPAA mandate that was recently updated to include data storage/cloud service providers within the scope of liability. HIPAA comes with fines and penalties for breaches of patient data.[read more]

Is Your Data Secure? [INFOGRAPHIC]

July 30, 2013 by Mark van Rijmenam

A lot of consumers and organisations are using the cloud and all that data is stored in massive data centers all over the world. Google, Facebook, the NSA and many others have built gigantic data centers that can store up to a Yottabyte of data! But how secure is your data actually in those data centers?[read more]

Encrypting Backup Data for HIPAA and PCI Compliance

July 26, 2013 by April Sage

Stored data is a top target by hackers, especially the type of data that can be used for fraud and medical identity theft – within the healthcare industry in particular, encrypting stored data to meet HIPAA compliance is one way to avoid the HIPAA Breach Notification Rule and keep data secure.[read more]

The NSA, Link Analysis and Fraud Detection

July 25, 2013 by Dean Abbott

The recent leaks about the NSA’s use of data mining and predictive analytics has certainly raised awareness of our field and has resulted in hours of discussions with family, relatives, friends and reporters about what predictive analytics can (and can’t) do with phone records, emails, chat messages, and other structured and unstructured data.[read more]

Encrypting Data for Data Breach Prevention

July 23, 2013 by April Sage

The State of California released a report on 2012 data breaches that found 1.4 million residents would have had their information protected if companies had encrypted data in transit when sent from their company’s network. The report showed 131 data breaches affected 2.5 million Californians, as well as listing recommendations of how to avoid loss or theft of data.[read more]


type != 'infographic') ) { ?>