Remove tag sensitive-data
article thumbnail

From Data Swamp to Data Lake: Data Classification

Perficient

This is the third blog in a series that explains how organizations can prevent their Data Lake from becoming a Data Swamp, with insights and strategy from Perficient’s Senior Data Strategist and Solutions Architect, Dr. Chuck Brooks. For example, financial records, intellectual property, and authentication data.

Data 111
article thumbnail

Handling personal identifiable information in your data

Xebia

In one of my previous blog posts we discussed a number of data and security-related topics. One of the topics that were discussed was about handling personal identifiable information (PII) data and complying with regulations like GDPR. Handling Personal Identifiable Information in your data pipelines. Amazon Comprehend.

Data 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Metadata Management and Data Governance with Cloudera SDX

Cloudera

In this article, we will walk you through the process of implementing fine grained access control for the data governance framework within the Cloudera platform. In a good data governance strategy, it is important to define roles that allow the business to limit the level of access that users can have to their strategic data assets.

article thumbnail

Want Custom Software? Here’s What You Need First.

Invid Group

Custom software development comes with a price tag, so it is important to set a budget that works for you. If you want a more comprehensive look into what goes into a Custom Software quote, read our blog “How Much Does Custom Software Cost?” Budget Realistically Now, let’s talk numbers.

Software 105
article thumbnail

Metadata Management & Data Governance with Cloudera SDX

Cloudera

In this article, we will walk you through the process of implementing fine grained access control for the data governance framework within the Cloudera platform. In a good data governance strategy, it is important to define roles that allow the business to limit the level of access that users can have to their strategic data assets.

article thumbnail

Enhancing Transportation Cybersecurity and Fleet Management for the DoD

Tenable

In this blog post, we’ll outline the challenges involved in protecting the DoD’s transportation systems from cyberattacks, and offer OT security recommendations. Data breaches: Sensitive information, such as troop movements and logistics data, could be leaked in a cyberattack, jeopardizing national security.

article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. The vulnerable web application is the same one we used in the first blog of this series. You can download the source code here: vulnap p.