TDAN.com

MenuMenu

  • Home
  • Articles
  • Columns
  • Features
  • Blogs
  • News
  • Events
  • Resources
    • Non-Invasive Data Governance Online Training
    • Bookstore
    • White Papers
    • KIK Consulting & Educational Services
    • DATAVERSITY
  • Archives
  • Strategy
  • Governance
  • Architecture
  • Data Mgmt
  • Quality
  • Modeling
  • Operations
  • Metadata
  • MDM
  • BI
  • Applications
  • Big Data
NoSLQ Now Sponsors
  1. Home
  2. Posts tagged: cybersecurity

cybersecurity

COL02x-feature-image-for-obrien-300x300-1.jpg

Data is Risky Business: A Wicked Problem This Way Comes

A recent data security incident in the Police Service of Northern Ireland (PSNI) got me thinking about the idea of…

  • Published: September 6, 202312:13 am
  • Author Daragh O Brien
ART02x-feature-image-edited-1.jpeg

Unique Threat Landscape of Digital Divide

Rural areas worldwide are disconnected in a landscape that nearly requires the internet to work or socially interact. But eventually,…

  • Published: August 2, 202312:07 am
  • Author Ellie Gabel
BLG01x-feature-image-edited-1.jpeg

Resilience in Data Services Through Mitigation and Prevention

If your company works with data, then you need to work on securing it. When it’s lost or stolen by…

  • Published: August 2, 202312:05 am
  • Author Ainsley Lawrence
ART04x-feature-image-edited.jpeg

Privacy, Security & Machine Learning

Data privacy and security matter. Given this, it will be a big deal if machine learning can make them easier…

  • Published: June 7, 202312:11 am
  • Author Myles Suer
ART01x-feature-image-edited.jpeg

Protect Data Without a Password

In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just…

  • Published: June 7, 202312:05 am
  • Author Ainsley Lawrence
FEA02x-feature-image-edited.jpeg

Mitigate Risks and Protect Sensitive Procurement Data

Procurement is an essential function within any organization, involving the acquisition of goods and services necessary for business operations. However,…

  • Published: May 17, 202312:11 am
  • Author Marijn Overvest
BLG02x-feature-image-edited.jpeg

Boost E-Commerce with Customer Verification

Data breaches have been rampant these days, and many companies realize they need to enhance their customer verification process. Proper…

  • Published: May 17, 202312:05 am
  • Author Juliette Anderson
ART01x-feature-image-edited.png

Most Common Types of Data Breaches

A company that manages data must be always cautious against the potential of data breaches. There are several types of…

  • Published: May 3, 202312:11 am
  • Author Stuart Snape
BLG02x-feature-image-edited.jpeg

Protect Data With Pillars of Zero Trust

Your security team has plenty of challenges, but securing and protecting your data with consistent, granular, and automated enforcement across…

  • Published: December 21, 202212:05 am
  • Author John Armstrong
ART04x-feature-image-edited.jpeg

What Happens When Your Cyber Defenses Are Breached?

It’s past time for a comprehensive data security strategy Information Security professionals tend to focus on network, cloud, application, and…

  • Published: November 16, 202212:15 am
  • Author Piet Loubser

Posts navigation

Page 1 Page 2 Next page

Search TDAN.com

Follow TDAN.com:

  • twitter
  • facebook
  • linkedin

Advertisements

 

 

Upcoming Events

  • No events

Quote of the Week

“Without clean data, or clean enough data, your data science is worthless.” — Michael Stonebraker, adjunct professor, MIT

Popular Posts

ART03i-Giles-image_CR.jpeg

Universal Data Vault: Case Study in Combining “Universal” Data Model Patterns with Data Vault Architecture – Part 1

  • Published: November 1, 201512:20 am
  • Author John Giles
ART01-Image-CR-Data-Modeling-is-Data-Governance-copy.jpg

Data Modeling is Data Governance

  • Published: August 1, 201512:45 am
  • Author Robert S. Seiner
FEA02x-image-ed.jpg

Data Warehouse Design – Inmon versus Kimball

  • Published: September 1, 20161:20 am
  • Author Sakthi Rangarajan
imageedit_2_7355576828.jpg

The Digital Transformer

  • Published: August 1, 201512:40 am
  • Author Charles Betz
BLG01x-image-ED.jpg

Understand Relational to Understand the Secrets of Data

  • Published: May 3, 20171:00 am
  • Author Ted Hills

Tags

agile AI algmin analytics artificial intelligence bi big data business glossary business intelligence cybersecurity DAMA data data analytics data architecture database data catalog data centric data governance data management data model data modeling data quality data science data security data steward data stewardship Data Strategy data warehouse DBA DGPO framework hoberman machine learning mccomb mecca Metadata mullins NIDG non-invasive data governance obrien oneil privacy project management seiner stewardship

© 1997 – 2023 The Data Administration Newsletter, LLC

All trademarks and registered trademarks appearing on TDAN.com are the property of their respective owners.

About

  • About TDAN.com
  • Contact Us
  • Advertise With Us
  • Write For Us
  • Disclaimer

Community

  • Upcoming Events
  • Articles
  • Columns
  • Features
  • Blogs
  • Newsletters Archives
  • Published by DATAVERSITY
  •  
  •  
  •  
  • KIK Consulting
    www.kikconsulting.com

Produced By: DATAVERSITY Digital LLC

info@dataversity.net

All trademarks and registered trademarks appearing on DATAVERSITY.net are the property of their respective owners.

About

  • About Us
  • Contact Us
  • Press Room
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Subscribe to DATAVERSITY

Community

  • Conferences
  • Upcoming Webinars
  • Data Jobs
  • Whitepapers
  • Blogs By Industry Experts
  • Articles
  • News
  • Newsletters
  • RSS Feeds

DATAVERSITY Productions

  • DATAVERSITY.net
  • DATAVERSITY Training Center
  • Concept & Object Modeling Notation (COMN)
  • The Data Administration Newsletter - TDAN.com
scroll to top