Protect Data Without a Password
In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just…
Get a thorough Data Strategy education through TDAN’s Business Intelligence articles, news, and blogs.
In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just…
Non-Invasive Data Governance (NIDG), like the popular Netflix series Stranger Things, offers a mysterious and complex reality for organizations to…
Justifying any significant business investment is challenging. For data managers, the struggle is especially familiar. The difficulty is convincing decision…
Procurement is an essential function within any organization, involving the acquisition of goods and services necessary for business operations. However,…
This article is the fourth installment in a series taking a deep dive on how to do a Current State…
Data breaches have been rampant these days, and many companies realize they need to enhance their customer verification process. Proper…
A company that manages data must be always cautious against the potential of data breaches. There are several types of…
Achieving Enterprise Data Awareness is a natural maturity progression within the governance domain. At this stage, companies rightly see Data…
Something has been bothering me about data products. It’s the point at which the consumer of a data product immediately…
For the Enterprise Data Management Council (EDMC), I recently concluded a detailed comparison and mapping of the DMM to the…