Remove tag data-security.-gdpr
article thumbnail

From Data Swamp to Data Lake: Data Classification

Perficient

This is the third blog in a series that explains how organizations can prevent their Data Lake from becoming a Data Swamp, with insights and strategy from Perficient’s Senior Data Strategist and Solutions Architect, Dr. Chuck Brooks. For example, financial records, intellectual property, and authentication data.

Data 111
article thumbnail

Handling personal identifiable information in your data

Xebia

In one of my previous blog posts we discussed a number of data and security-related topics. One of the topics that were discussed was about handling personal identifiable information (PII) data and complying with regulations like GDPR. Handling Personal Identifiable Information in your data pipelines.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Let’s Flink on EKS: Data Lake Primer

OpenCredo

Data is established as the driving force behind many industries today, and having a modern data architecture is pivotal for organizations to be successful. The first part of this blog is related to the Flink and S3 infra design. A tenant is the owner of the data. to now include a Kubernetes Operator. endpoint: s3.eu-west-2.amazonaws.com

Data 59
article thumbnail

The True Cost of Cybersecurity Incidents: The Problem

Palo Alto Networks

How Investing in Security Now Can Save Big Bucks Later. This is the first of a two-part blog series, breaking down the cost of dealing with a cybersecurity incident versus the cost of investing to prevent an incident. Cyber criminals are aware that small businesses often have a small security budget and could be easier targets.

article thumbnail

2020 Data Impact Award Winner Spotlight: Merck KGaA

Cloudera

The Data Security and Governance category, at the annual Data Impact Awards, has never been so important. The sudden rise in remote working, a huge influx in data as the world turned digital, not to mention the never-ending list of regulations businesses need to remain compliant with (how many acronyms can you name in full?

Data 98
article thumbnail

Operational Database Security – Part 1

Cloudera

In this blog post, we are going to take a look at some of the OpDB related security features of a CDP Private Cloud Base deployment. Data-at-rest encryption. Transparent data-at-rest encryption is available through the Transparent Data Encryption (TDE) feature in HDFS. . Mature key lifecycle management features.

article thumbnail

Operational Database Security – Part 2

Cloudera

In this blogpost, we are going to take a look at some of the OpDB related security features of a CDP Private Cloud Base deployment. We are going to talk about auditing, different security levels, security features of Data Catalog, and Client Considerations. Security assessment. Security levels.