Remove Subscribe
article thumbnail

12 Data Loss Prevention Best Practices (+ Real Success Stories)

eSecurity Planet

12 Data Loss Prevention Best Practices 3 Real Examples of DLP Best Practices in Action How to Implement a Data Loss Prevention Strategy in 5 Steps Bottom Line: Secure Your Operations with Data Loss Prevention Best Practices When Should You Incorporate a DLP Strategy? Explore these real-life examples for additional insights.

article thumbnail

Data Modeling 201 for the cloud: designing databases for data warehouses

erwin

I first met Ralph in the early 1990’s while attending one of his seminars. I’ve watered it down a bit to make it simple enough for use as an example. They do not have to be simple time-based ones like was shown in the prior example. Here is an example of a snowflake added to our prior star schema model. Like this blog?

Cloud 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Second year running! Enabling Knowledge Management with Technology Masterclass in Singapore

ChiefTech

Like any of the seminars or workshops I run, I like to make things as interactive as possible and one of my favourites parts of the masterclass where I "debunk" the data > information > knowledge concept. For example, large distributed organisations. I agree - Enterprise 2.0 Because fundamentally you dont need technology for KM.

Paper 40
article thumbnail

How to Prevent Malware: 15 Best Practices for Malware Prevention

eSecurity Planet

Also read: 19 Different Types of Malware Attacks: Examples & Defenses 3. Regular training, seminars, quizzes and even an occasional test email not only check your workforce’s ability to detect suspicious cyber occurrences, but also foster a watchful business culture. You can unsubscribe at any time.

Passwords 122
article thumbnail

Notes about MySourceMatrix

ChiefTech

A few weeks ago I attended a half-day seminar on the MySourceMatrix Web Content Management System (WCMS). Better late than never, here are some of my notes from the presentation. So, while I don't think you should approach this simply as a free product this doesn't mean there isn't any value in the Squiz.net model.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

For example, at the time was writing by book on IoT Security, When Gadgets Betray Us, Paul was off creating The Security Ledger, a news site dedicated to IoT security, a site where he remains Editor in Chief today, runs a Boston-area security of things meetup, and maintains his own great infosec podcast called the Security Ledger podcast.

article thumbnail

The Hacker Mind Podcast: The Right To Repair

ForAllSecure

For example, at the time was writing by book on IoT Security, When Gadgets Betray Us, Paul was off creating The Security Ledger, a news site dedicated to IoT security, a site where he remains Editor in Chief today, runs a Boston-area security of things meetup, and maintains his own great infosec podcast called the Security Ledger podcast.