Recent Publications

23

September 2019

Security in the Age of Big Data

Data is everywhere in many forms: structured, unstructured, social media, caller logs, machine learning logs, etc. and everyone is working towards capitalizing its power. Individuals, commercial organizations and government seek to leverage the tremendous potential of data analytics. Although, what is possible today using the Big Data technology is just the "tip of the iceberg" and there is more to come. As a result, the way data is construed is in a state of transformation. The view of what data is and how data is captured is continually changing and these changes are impacting the way organizations are looking at their information security.

Know More

28

August 2019

Old Is Still Gold: Securing Dormant Health Data

Data security, in its broader context, is dealt with data in a production database. However, not all the data in production systems is being used frequently and organizations have turned to data hoarders. The general perception of anyone in the executive leadership of an organization is that the cost of holding data is low when compared with the cost of not having access to specific data when required. New regulations like GDPR (General Data Protection Regulation) in the European Union along with the increase in the security breaches that are being reported has changed this trend.

Know More

16

July 2019

Healthcare Data Breaches: The Intangible Costs

Traditionally, only financial data was nucleus for cyber theft and misuse. This paradigm is changing with more and more healthcare data breaches being reported every month. One of the reasons could be that this information cannot be cancelled as easy as a compromised credit card would be. The IT landscape has changed from office work to mobile workforce, desktops to compact laptops and tablets. These changes have created a nightmare for IT professionals who are charged with a complex infrastructure setup that not only accommodates the requests of the workforce, but also ensure sure the data is secure. With many new stringent regulations coupled with hefty fines for data breaches, data security has never been more important in healthcare organizations.

Know More

Latest Blogs

12

October 2019

How To: Integrate Enterprise Data Catalog and IICS (Informatica Cloud)

Catalog search can be done from Informatica Cloud.

12

October 2019

Sub-setting via Entity Vs. Using a Group

What to use: an Entity or a Group to subset and copy data.

12

October 2019

How To: Maintain input data format when masking

Do you need to maintain data format after masking?