-
Proactive Security Strategy for the Public Sector (10 Steps, Part One)
The U.K. public sector holds some of the most important and sensitive data in the country, from private medical records to military intelligence. Consistently protecting this data is a major priority, which means the IT teams working within the public sector are entrusted with implementing the most effective security…
-
Worried About Protecting Your Data? CDM Is Here to Help
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen about improving security by leveraging the phases of the CDM program and enhancing data protection by taking one step at a time. The Continuous Diagnostics and Mitigation (CDM) Program, issued by the…
-
Culture of Data Protection: Data Quality, Privacy, and Security
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design: To Reward, We Must Measure. How do we fix this? We start rewarding people for data protection activities. To reward people, we need to measure their deliverables. An enterprise-wide…
-
The Actuator – September 26th
In Orlando this week for Microsoft Ignite. Lots of great announcements happening, I'm trying my best to digest it all and it's best to talk data with a friend. So, stop by the booth, say hello, and let's chat. As always, here are some links from the Intertubz that I hope will hold your interest. Enjoy! Microsoft Managed…
-
Data Protection: Culture, Tools, People, and Roles
In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations) I covered the background of building a culture. In this post, I'll be going over the Tools, People, and Roles I recommend to successful organizations. Tools Given the volume and complexity of modern data…
-
Culture of Data Protection: What Your Customers Expect
We've talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we'll be considering the culture of protection the actual owners of the data (customers, employees, vendors, financial partners, etc.) expect from your…
-
Culture of Data Protection: Development Counts, Too.
In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data when it seems everyone else wants to take the easiest…
-
Building a Culture for Data Protection
Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data when it seems everyone else wants to take the easiest route to getting stuff done. I can hear the pleas from here: * We don't have time to deal with SQL injection…
-
5 More Ways I Can Steal Your Data
In my soon-to-be-released eBook, 10 Ways I Can Steal Your Data, I cover the not-so-talked-about ways that people can access your enterprise data. It covers things like you're just GIVING me your data, ways you might not realize you are giving me your data, and how to keep those things from happening. The 10 Ways eBook was…
-
5 More Ways I Can Steal Your Data: Hire People Who Lack Empathy
In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that one trait that we in technology stereotypically aren't known for displaying. But I know there are IT professionals out there who have and use it. These are the people I need on my…