Category: Security

author:

Database Security

Data Protection: Culture, Tools, People, and Roles


In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection tools, people, and roles I recommend to successful organizations. Tools Given the volume and …



author:

Security

Protection Methods – The Art of Data Analytics


The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …