As data management underlies almost all areas of organizational operations, the way in which that data is collected (or procured) and used has been the topic of intense focus and legislative debate. This area is often called “data ethics” and is the purview of analysts, data scientists, and IT professionals. For anyone in your organization
Category: Security
What could possibly be worse than ransomware?
64X greater damage than familiar data breaches Ransomware is often top-of-mind when you discuss cybersecurity threats with just about anyone in any industry. The threat of having all your business data stripped away and held under virtual lock and key until a hefty ransom is paid can give many an executive a sleepless night. However,
Why you should consider zero trust for your hybrid workforce
Flexible work models require a different security philosophy Just a few years ago, many cybersecurity teams operated using a philosophy of “trust but verify.” If you were on the corporate network, either directly or via VPN, you were trusted and given full access. But workplaces and work devices have changed. We’ve moved from a small