Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security …

Healthcare needs a data centric security approach

With increasing attacks on PHI data, coupled with more stringent data security requirements and regular audits, organizations should act now – before it’s too late. A recent …

Imperfect algorithms threaten democracy

Do we want algorithms that we can’t understand or question to influence how we get to live our lives? Unfortunately, as Cathy O’Neil, well-known mathematician and …