What Happens When Your Cyber Defenses Are Breached?
It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…
Data Management Articles
It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…
Wait a minute… You thought I was talking about data stewards deserving more money for what they do? That is…
The word “oversight”, has two mirror meanings. The usual meaning, most frequently encountered, is that of observing something in broad…
“Technical debt” refers to the implied cost of future refactoring or rework to improve the quality of an asset to…
“First thing we do, let’s banish all of the CIOs.” Too harsh? Shakespeare was much harder on lawyers. But the…
Fortune 1000 organizations spend approximately $5 billion in total each year to improve the trustworthiness of data. Yet, only 42%…
Data is the viral sensation crashing the data governance capacity. Use of data is disrupting industries, economies, even some government…
Data Mesh and Data as a Product In the first article, I introduced and explained the approach to application development…
Introduction The Chief Data Officer is a relatively recent addition to the classic C-suite roles. C-level’s in larger organizations are…
Technology is making it easier and easier to run a business, but sometimes you must step back and look at…