At a time when you can have nearly unlimited storage in the cloud, when you can purchase disk space and storage options for pennies on the dollar of what it used to cost, you may consider that the statement that the costs are skyrocketing is, well, silly. The acquisition costs are indeed lower. But the risks and management and administrative […]
Ethics
You and I, we have a reputation problem…
I’ve been talking to all sorts of folks about speaking for the upcoming virtual conference – and we’ll have a heck of a roster, to be sure. But the thing is, there is a weird pattern emerging. When it comes to talking with people that are deep in the security space, and we’re talking about possible topics, they’re genuinely surprised […]
We’re At A Critical Tipping Point Data Control and Privacy-Wise
This is an incredibly important time in the life of a data professional I believe. These are times that are going to shape exactly what’s expected of us all in terms of data ownership, data protection, data privacy, data security and so-on. All of those things sort of fall under the heading of Data Management, particularly when you consider the two […]
Keeping It Real – Or Communicating, Without Insulting
One of the things that seems to come up over and over again in talking with data folks is this concept of having to communicate. I’m not saying we’re collectively hermits. What I mean is that it’s difficult to explain complex topics to people that are impacted by them, but sometimes… they just don’t care. They want to get their […]
Critical Data Recovery is Multi-Faceted
Yesterday, the post was about cyber-attack recovery. Talking about the need for a more comprehensive recovery mechanism and approach than just “restore to the most recent backup.” As mentioned, this also applies to failover systems. In many cases, people will put in failover systems (or cloud-based services that are highly unlikely to go down) and figure they’re covered. But the […]
Cyber-Attack Recovery – Are You Ready?
Many times when folks are planning for recovery of a system, it’s because they anticipate that the system will crash or will be unavailable in a fairly traditional way. (Is there a traditional way for a system to crash???) However, as I was reading a post about the premise that the “Majority of banks [are] still vulnerable to cyber attacks” […]
Legacy Systems are a Liability
In the past couple of years, it’s come up several times that legacy systems are a challenge to manage… no surprise there. But what follows that conversation may be surprising – many times companies will take that first step, and decide that legacy systems are actually a liability. That they’re something that should be removed, gutted, replaced if at all possible. […]
So What Can Be Done? Protecting Data, Protecting Your Company/Client
A few people have written to me asking about different things that can be done to protect information in the systems. The fact is that companies are indeed thirsty for every single bit of information they can get their hands on, whether they have a use for it now or not. The thought is that it may be helpful/useful later […]
Data Responsibility and Data Architecture
There have been a few posts now talking about a corporate thirst for big data (I love that analogy – because it IS a thirst) and the fact that companies have this all-out push to get as much information as possible. I don’t mean to vilify companies or any of that. It’s the promise of using information to better serve customers with […]
Have We Crossed a Threshhold with SQL Server Security?
It seems like we’re (finally) moving into an implementation phase with SQL Server and data security. By that I mean, it seems like we are close to having the tools we need for various places in the lifetime of information and, for a good majority of them, those tools do indeed provide the cover to implement good security. Application firewalls and […]