Quantcast
Channel: Claudia Chandra – The Informatica Blog – Perspectives for the Data Ready Enterprise
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Which Method of Controls Should You Use to Protect Sensitive Data in...

Protecting Sensitive DataI’m often asked to share my thoughts about protecting sensitive data. The questions that typically come up include: Which types of data should be protected? Which data should...

View Article



Image may be NSFW.
Clik here to view.

Which Method of Controls Should You Use to Protect Sensitive Data in...

Protecting Sensitive DataTo determine what is the appropriate sensitive data protection method to use, you should first answer the following questions regarding the requirements: Do you need to protect...

View Article

Image may be NSFW.
Clik here to view.

Securing Sensitive Information in the Big Data World

Securing Sensitive Information in the Big Data WorldThe last year have seen a lot of improvements in big data security.  Some are available natively as part of the Apache framework and various Hadoop...

View Article

Image may be NSFW.
Clik here to view.

What Is Data Security Intelligence?

Data Security Intelligence (DSI) provides highly automated technology solution for the collection and correlation of information about sensitive data, continuous risk monitoring risk , analytics to...

View Article

Image may be NSFW.
Clik here to view.

Part 1: The Importance of Test Data Management for Development and Operations

Part 1: The Importance of Test Data Management for Development and Operations The adoption of agile software development has prompted the tighter collaboration between development and operations...

View Article


Image may be NSFW.
Clik here to view.

Part 2: The Importance of Test Data Management for Development and Operations

Part 2: The Importance of Test Data Management for Development and Operations In my previous blog on The Importance of Test Data Management for DevOps Part 1, I discussed how Test Data Management tools...

View Article

Image may be NSFW.
Clik here to view.

How Mature is your Organization’s Security Program?

How Mature is your Organization’s Security Program? Perimeter defense is dead since there is no longer a perimeter. An organization’s data exists everywhere, on premise, in the cloud, and on multiple...

View Article

Image may be NSFW.
Clik here to view.

The Missing Link for User Behavioral Analytics: Focus on Sensitive Data

Security analytics solutions that rely only on rules to detect violations and potential threats suffer from too many false positives and the inability to identify previously unknown threat patterns. To...

View Article


Image may be NSFW.
Clik here to view.

Critical Capabilities for Detecting Insider Threats and Protecting Sensitive...

Sensitive data is at the heart of all data breaches and protecting it is among most organizations’ top priorities. But why is protecting the data crown jewels so difficult? Firstly, regardless of...

View Article


Image may be NSFW.
Clik here to view.

Data Leakage Prevention Tips

Data Loss Prevention I had thought that data leakage and data loss are one and the same, until I had a discussion with our CISO, Roger Hale. He gave me his thoughts on the difference between the two....

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images