Sign up | Login with →


5 Advantages of Using Encryption Technology for Data Protection

September 12, 2016 by Ryan Ayers

Data breach and mega attacks are on the rise and at an all time high. With recent advancements developing in encryption technology, hackers are having are harder time breaking into sensitive data. This article overlooks five advantages of encryption technology and how it can protect confidential information.[read more]


4 Best Practices for Backing Up and Recovering Data

July 15, 2016 by Ryan Ayers

Protecting and accessing company data is an issue every modern business, large or small, needs to prioritize. According to 24/7 Wall Street, there have been 16% more data breaches in 2016 than during the same period in 2015, and this upward trend is not new. With data breaches on the rise each year, preserving irreplaceable data should...[read more]

Pssst … How Much Money For Your Personal Data?

June 3, 2016 by Bill Franks

We’re all generating a lot of data about ourselves and how we live day to day. There are personal fitness devices, preferences and opinions expressed on social media, details on when we’ve come and gone from the house from our security systems, and more. It isn’t just data that companies are collecting from us, but data that we are...[read more]


5 Essential Steps To Take After A Data Security Breach

May 19, 2016 by Particia Dimick

Hackers are an insensitive breed, with no respect for violating other people’s finances and personal business dreams.Like pickpockets stealing wallets, they steal usernames and passwords to get access to credit lines, bank accounts, and payment processors. Like con men, they look for data that will allow them to steal someone’s...[read more]


Big Data in the Sports Industry

December 23, 2015 by Trisha Miller

Professional athletes everywhere are being asked to wear tech that will track their every move and download patterns of their stats. Will this help to improve the game or could the usage of big data destroy sports as we know it?[read more]


Big Data Helps Alleviate Aviation Risk Management Problems

December 23, 2015 by Sarah Smith

Today, an increasing number of commercial airlines employ Big Data and real time analysis to help alleviate problems in many traditional areas of aviation risk management. Modern aviation safety management systems suggestion here can benefit from the creative use of these high tech tools in a variety of ways. Passengers have already begun to see the benefits.[read more]


As the Internet of Things Mobilizes, Safeguarding the Cloud Is Our Prerogative

August 6, 2015 by Daniel Matthews

Where we drive with big data now will determine our destination on the Internet of Things superhighway. Securing data on the cloud is imperative--here is a rundown on doing just that.[read more]


It’s Your Life, Starring Your Data

July 27, 2015 by Tamara Dull

At a recent EPIC Champions of Freedom privacy event, Apple’s CEO Tim Cook finger-wagged some of his Silicon Valley neighbors—without mentioning names Facebook and Google—on how they were using their users’ data. “They’re gobbling up everything they can learn about you and trying to monetize it. We think that’s wrong. And it’s not the kind of company that Apple wants to be,” Cook said.[read more]


Is Privacy Dead? And the Survey Says

July 8, 2015 by Tamara Dull

In today’s data economy, we’re sharing a ton of personal information about ourselves online. And this privacy discussion is only going to get bigger, especially as companies and government agencies get better at collecting, analyzing, and sometimes selling the data we’re freely sharing with them. Trust is at the heart of the privacy issue and is the glue that will keep the data ecosystem together.[read more]

The Rise and Risk of BYOD (INFOGRAPHIC)

June 19, 2015 by Chris Falgout

The BYOD trend presents its own concerns when it comes to protecting confidential workplace data. As the trend continues to gain steam, CIOs and IT departments are faced with a whole different set of variables due to the variety of devices and the relative level of security that comes with each device. The push to be able to your own mobile device to work is also a push to house personal information and apps alongside company data. It can be a risky endeavor.[read more]

Privacy Policy: 3 Things to Consider Before You Click 'I Accept'

June 15, 2015 by Sima Thakkar

As shown in the recent Oscar-winning documentary Citizenfour, people were up in arms about the NSA tapping people’s phone calls under the pretense of protecting the freedom of American citizens. Whistleblower Edward Snowden’s primary mission was to point out that personal information was unethically being handed over to the government without the permission of millions of U.S. citizens. But what about when you do give permission?[read more]


You May Not Be as Anonymous as You Think

March 11, 2015 by Tamara Dull

The Big Data MOPS Series.

What may be classified as anonymous may, in fact, be pseudonymous. With pseudonymity, an ID or number of some sort is typically used to tie back to an individual – without revealing any PII, such as the person’s name.[read more]


PII, Anonymized Data, and Big Data Privacy

February 12, 2015 by Tamara Dull

The Big Data MOPS Series.

Did you know that most Americans (87%) can be uniquely identified from just three pieces of personal data: a birth date, five-digit zip code and gender? Sort of disconcerting, right?[read more]


Let’s Get Our Facts Straight About Big Data Privacy

January 28, 2015 by Tamara Dull

The Big Data MOPS Series. 

In this big data world in which we live, we are being forced to address privacy issues - whether we want to or not – as consumers, citizens, and employees in the private and public sectors. Let’s get our facts straight about big data privacy and help others do the same.[read more]


My 7 Big Data Favorites of 2014

December 24, 2014 by Tamara Dull

The Big Data MOPS Series.

To put a nice bow on this year’s big data discussion, I’d like to share some of my favorite content from 2014 from around the web. It wasn’t easy, but I narrowed the list down to 7 items, including articles, a comic book, a white paper, an infographic, and a video. Check out the list and see what you think.[read more]