Remove Big data Remove Encryption Remove Mining Remove Survey
article thumbnail

It’s time to think twice about retail loyalty programs

Thales Cloud Protection & Licensing

As I was starting to write this blog, yet another retail program data breach occurred, for Marriott’s Starwood loyalty program. In this case, it looks as though the attackers had been on the Starwood network for somewhere around three years, mining out their reservations database (keep in mind that Marriott only acquired Starwood in 2016 ).

Retail 66
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

The 57 percent rate statistic is the highest of all verticals we measured in this year’s report (others include the healthcare industry, the retail industry, and the financial services industry) or any region surveyed. Look at how frequently we hear about AWS S3 buckets left out in the clear with sensitive information for hackers to mine.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top GRC Tools & Software for 2021

eSecurity Planet

Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files. SAP’s in-memory data access will give you top-of-the-line big data and predictive analytics capabilities tied to risk management. Case & survey management.

article thumbnail

Top 10 Governance, Risk and Compliance (GRC) Vendors

eSecurity Planet

Like other competitive GRC solutions, it speeds the process of aggregating and mining data, building reports, and managing files. SAP’s in-memory data access will give you top-of-the-line big data and predictive analytics capabilities tied to risk management. Case & survey management.

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

A recent Iron Mountain US government employee survey cited the skills gaps that need to be closed by tomorrow’s info pro. The “public ledger” role and “smart contract” applications of blockchain already in existence sound suspiciously familiar to our turf, and they’re handled by encryption keys and code, not by people.