Remove Course Remove Demo Remove Government Remove Security
article thumbnail

Data Governance for Smart Data Distancing

erwin

I hope you and your family are staying safe, practicing social distancing, and of course, washing your hands. During this coronavirus emergency, we are all being deluged by data from politicians, government agencies, news outlets, social media and websites, including valid facts but also opinions and rumors. Hello from my home office!

article thumbnail

Weekly Update 390

Troy Hunt

I'm reminded of the old "fast, good and cheap - pick 2" saying, but there's a lot more nuance to it than that, of course. References Sponsored by: Kolide ensures that if a device isn't secure, it can't access your apps. Watch the demo today! Or geo-replicate. It's Device Trust for Okta.

Access 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to implement data governance

Collibra

So your team has identified implementing data governance as a priority for the year. You’ve evaluated and demoed countless technologies and you think you’re ready to select a solution. But what happens once you purchase a data governance platform? This article is meant to outline the vital steps for implementing data governance.

article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. If there is sufficient interest, I may write a few subsequent posts that go into more depth about our courses.

ECM 116
article thumbnail

Free resources to help you prevent and respond to data breaches

IT Governance

The situation might seem hopeless, with cyber criminals outnumbering overworked and underfunded information security personnel, but there are plenty of ways you can improve your defences, even on a tight budget. Our blog provides daily updates on all things information security-related. Green papers. Green papers.

article thumbnail

Penetration testing methodologies and standards

IBM Big Data Hub

To mitigate and prepare for such risks, penetration testing is a necessary step in finding security vulnerabilities that an attacker might use. A penetration test , or “pen test,” is a security test that is run to mock a cyberattack in action. These attacks are often performed by red teams, or offensive security team.

Risk 82
article thumbnail

6 things I love about working at Collibra after 6 years in sales engineering

Collibra

When he joined in 2016, data governance was still a new concept for many organizations. A friend reached out one day to tell me about this amazing company he had recently joined in the data governance space, and I immediately knew I had to be a part of what this company was doing.

Sales 52