369 results for 'data leak'
Artificial Intelligence Unstructured Data: A Hurdle in Embracing AI Technology Artificial intelligence (AI) is capable of doing things that were previously unimaginable. It can distinguish between a pedestrian and a road sign to guide a self-driven car, review the tone of an article and provide feedback, provide helpful patient data to a doctor, and fulfil a thousand other time-saving and thoughtful jobs. However, to do […]
Information Assurance 10 Biggest Data Breaches of All Time - And How to Prevent Them Data breaches. The term itself can ring alarm bells in most organizations, and for good reason. A data breach usually means thousands spent on remedial measures, millions in regulatory fines and the invaluable loss of customers' trust and confidence. (Also read: Massive Data Breaches: The Truth You Might Not Know About.) There have been numerous […]
Anas Baig 3 years
Encryption Encryption Just Isn't Enough: Critical Truths About Data Security The high-tech world uses a centuries-old tradition to protect your information. It encodes or encrypts your data. That encryption is why you see “HTTPS” with a green padlock in the URL bar. Notice the “s” at the end. It means “secure hypertext transfer protocol”, telling you the data on this website is encrypted to ensure […]
Jim Ivers 2 years
Software-as-a-Service (SaaS) Privacy Issues in the New Big Data Economy To succeed in the new data economy, companies are collecting massive amounts of consumer data. But these collection efforts rarely involve transparent explanations regarding data usage — and that’s a legitimate reason for consumers and privacy advocates to be concerned. I first realized the problems posed by big data collection back in 2012. That’s when […]
Emerging Technology Cloud Computing and Cloud Servers: How Do You Know Your Cloud Data is Protected? We don't necessarily associate clouds with stability – after all, the clouds you see out your office window (hopefully you have one) will change shape multiple times throughout the course of, say, drafting and sending an email. But thanks to the meteoric rise of cloud computing over the past decade-plus (and the growth that’s widely […]
Software Is Your Customer Data Really Safe? Businesses cannot afford to get complacent about data security, with tougher regulations and higher customer expectations bearing down on them today. Even if you have implemented measures designed to provide protection and ensure information is stored safely, how can you be sure that it is truly immune from unwanted exposure? Here are some of the […]
Identity & Access Governance What are some of the key pitfalls of big data contracts and how can companies avoid them? Vendor contracts are always a tough topic. You always want to protect yourself or your company, but you also don’t want to be so restrictive that the vendor feels handcuffed. Just like the agile method of developing, you want to have your vendor contract have the flexibility to allow for those frequent changes and pivots, […]
Software The Data Security Gap Many Companies Overlook If you’ve never seen a line of kindergartners marching out of a schoolyard hand in hand, the drill goes something like this: Count the kids, file them out, count them again as they file back in. That’s how a teacher ensures that everyone’s accounted for. It sounds like common sense, but unfortunately, a lot of […]
Identity & Access Governance How Dark Data Can Impact the Big Data World There are two ways to view the impact of dark data in the world of big data: As the opportunities hidden in big data As the risks dark data poses Almost all companies store dark data for varying time lengths, without any analysis. While they do so, they lose the opportunity to gain the insights […]
Kaushik Pal 10 years
Internet of Things (IoT) How Can We Handle Internet of Things (IoT) Generated Data Ethically? While the Internet of Things (IoT) gathers data at a frenetic pace and the influx of data grows in magnitude, a question is repeatedly being asked from many quarters: are we handling this data ethically? While the big corporations, governments and even cyber criminals view the data deluge as a veritable goldmine, many wonder if […]