The role of a data security analyst isn’t an easy one. It has always been hard to address data security because of the volume, speed and variety of data in…
Browsing CategoryData
It’s 2022: Do You Know Where Your Sensitive Data Is?
Looking at recent breaches and scandals, it’s not a mystery why organizations put a premium on good data security and governance practices. Yet, there is one aspect of data security…
Database Security Best Practices: The Essential Guide
In 2021, an F-35 fighter jet is more likely to be taken out by a cyberattack than a missile. In the digital age, the threat of an attack is everywhere…
How AI Prevents Fatigue After Data Breaches
I have data breach fatigue. Every day, my inbox is flooded with dozens of emails about the newest data breaches and what causes them. Five years ago, I took note of…
Data Security Along Every Stage of the Journey
Let’s say you’re planning a train robbery in the Old West. Your posse can jump on board at the station, on the route or at the last stop. The same is…
Educating the Educators: Protecting Student Data
I found my 17-year-old son happily playing video games last year when he was supposed to be in virtual school. But after a few questions, I learned he wasn’t skipping…
Cloud Security: Why Being Intentional in Encryption Matters
Cloud security and web application security demand technology and practices that protect applications and data hosted remotely. Good old-fashioned data encryption is chief among these. The reasons for encrypting cloud…
Taking Time Off? What Your Out of Office Message Tells Attackers
As more people are vaccinated and free to live a more normal life again, vacation plans, trip pictures and conference hashtags will flood social media sites. Phone calls and emails…
Why Security Pros Can’t Ignore Big Data Monopolies
The rise of the cloud didn’t free us from concerns over who stores our data. Where matters, and major cloud providers and big data monopolies host a huge percentage of…
Don’t Stop At ‘Delete:’ How Privacy Needs Are Shaping Data Destruction
It’s just part of the job: at some point in a device’s lifecycle, data must be destroyed. While deleting files may mean users and apps can’t access them, simple deletion…