A Quick Tech Tutorial: Two-Factor Authentication
Two-factor authentication is a best practice to fulfill authorization and authentication requirements for HIPAA compliance or PCI DSS compliance and…
Big Data Today: Living as Far from 1984 as Orwell
Over the last month I’ve been talking a lot about personally controlled records and the ownership of your own information.…
Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats
Last Thursday, the U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations; seeking…
Helpful or Creepy? Avoid Crossing the Line with Big Data
One of the most discussed concerns surrounding big data today is privacy. While many powerful analytics are possible with the…
Is Facebook Taking Big Data Analytics Too Far?
Big Data Analytics give companies the ability to understand their customers and markets better, improve internal efficiencies, and much more.…
Why Big Data Privacy Will Be Self-Regulating
Technological progress has always led to heated debates about the threats a new technology would pose for society and humanity.…
The Big Data Security Transformation
For those of us in the security profession it an extremely exciting but also daunting time. The number and aggressiveness…
SAP’s New Fraud Management Analytical Application
SAP recently announced its new Fraud Management analytic applications. Currently in “controlled” (limited) release, it’s a promising start for the product and a…
HIPAA Breach Lessons Learned
While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA…
Technology and the Effective Marketer
In this post, I'll focus on customer intelligence driven marketing and the proper use of data. In the "information economy,"…