Remove tag gdpr
article thumbnail

From Data Swamp to Data Lake: Data Classification

Perficient

This is the third blog in a series that explains how organizations can prevent their Data Lake from becoming a Data Swamp, with insights and strategy from Perficient’s Senior Data Strategist and Solutions Architect, Dr. Chuck Brooks. In this blog, we discuss the fourth capability: Implementing classification-based security in the Data Lake.

Data 111
article thumbnail

Handling personal identifiable information in your data

Xebia

In one of my previous blog posts we discussed a number of data and security-related topics. One of the topics that were discussed was about handling personal identifiable information (PII) data and complying with regulations like GDPR. However, it might not always be evident if your data contains specific information about people.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The True Cost of Cybersecurity Incidents: The Problem

Palo Alto Networks

This is the first of a two-part blog series, breaking down the cost of dealing with a cybersecurity incident versus the cost of investing to prevent an incident. Explicitly written on the official GDPR website, “GDPR fines are designed to make non-compliance a costly mistake for both large and small businesses.” Prevention.

article thumbnail

Let’s Flink on EKS: Data Lake Primer

OpenCredo

The first part of this blog is related to the Flink and S3 infra design. This blog is written exclusively by the OpenCredo team. Here at OpenCredo we love projects that are based around Kafka and/or Data/Platform Engineering; in one of our recent projects, we created an open data lake using Kafka, Flink, Nessie and Iceberg.

Data 59
article thumbnail

Operational Database Security – Part 1

Cloudera

In this blog post, we are going to take a look at some of the OpDB related security features of a CDP Private Cloud Base deployment. Apache Atlas-based tags or classifications. This was Part 1 of the Operational Database Security blog post. The post Operational Database Security – Part 1 appeared first on Cloudera Blog.

article thumbnail

2020 Data Impact Award Winner Spotlight: Merck KGaA

Cloudera

GDPR, CCPA, HIPAA.) As mentioned in my previous blog on the topic , the recent shift to remote working has seen an increase in conversations around how data is managed. Merck KGaA can successfully manage data access based on geo-location, resource, and also customized tags, by setting permission policies for its employees.

Data 98
article thumbnail

Operational Database Security – Part 2

Cloudera

They will only be shown the rows in compliance with these data consent requirements as required by recent regulations such as GDPR or CCPA. . For example, you can tag columns or column families as having PII and providing conditional access to users and groups based on such classifications. Column-level security.