Skip to main content

Posts Tagged ‘data security’

The New National Emergency: Cyber Threats

In a blog post earlier this year, I discussed the increasing role data security is playing in the world today.  As mentioned in the article, 2014 was dubbed the “Year of the Data Breach”.  Around the time of the post, Sony had just been hacked.  Subsequently we learned there was credible evidence the cyber-attack was […]

Is your Analytics Data Safer in the Cloud?

Leaders in information technology have traditionally been concerned with their company’s sensitive financial data residing in the cloud.  The concern is that with sensitive data in the cloud, it is at risk of being accessed by the wrong people. After 2014, or as I have seen it referred, the year of the data breach, one […]

Information Governance & The Cloud

The practice of Information Governance (IG) is evolving rapidly; it has become much more than just Data Governance. One of the most interesting and challenging additions to IG recently has been management of Cloud-related issues. The Cloud of 2014 is much different than how it was conceived just a few years ago (with strict and […]

10-key pad showing wear

Bankers Get a Compliance Wake-up Call with Data Breach

While most of the mass media news about Target’s card data breach has focused on the direct effects on consumers, the forensics of the breach are starting to trickle out through specialists like Brian Krebs, and they’re really fascinating. At the highest level, it appears the attackers seem to have been able to enter the […]

Social, Cloud and Security | What’s Hot at #IBMConnect

If you are fortunate to be attending IBM Connect right now, you know just how exciting some of sessions are. Mark Polly and Michael Porter have been the eyes and ears of Perficient at IBM Connect and have posted several articles about the buzz around social, cloud and data security. Follow these links to get […]

Big Data Security

In the Big Data Stack below, security is a vertical activity touching upon all aspects of a Big Data architecture which must receive careful attention, especially in a healthcare environment when PHI may be involved. NoSQL technologies, which many Big Data platforms are built upon, are still maturing technologies where security is not as robust […]

The Importance of Being Earnest about Security in Healthcare, Part 2

First, let me start with questions I asked at the close of Part 1. How does your organization manage security and its risks? Do you have a governance process in place, is it comprehensive, requirements driven, with the risks communicated, understood and mitigation plans developed and reviewed? Can you adequately answer these questions? If you […]

The Importance of Being Earnest about Security in Healthcare, Part 1

In Healthcare, we talk about how important security is, all the while secretly hoping and assuming that, as an organization, we’re in compliance and have all the appropriate safeguards in place. When discussing compliance, at the very least this refers to the baseline set by the HIPAA Security Rule and the many contractual obligations we […]

A conversation about privacy, security, and UX

Last week, I followed, nearly real time via Twitter, how Sean Power successfully recovered his stolen laptop. The full story is available, but here are a few excerpted tweets from @SeanPower on 13 May 2011: If you’re getting up to speed: Laptop was taken 4 days ago, but I had to fly to Canada the […]

Load More