As companies continue to place a greater emphasis on sharing and analyzing enterprise information, employees at all levels of the organization are starting to assume data management responsibilities. Unfortunately, this push for fluid communication and strategic interpretation has taken sensitive as...
As organizations aggregate and integrate information in greater volume and variety, protecting sensitive data has become a much more complex task. While the insights generated from pooling databases and mining reports can be immense, a keen eye should be kept on governance priorities to ensure innov...
Corporate executives live in constant fear of data breach scenarios which could leak sensitive assets out into the wild. But while headlines regarding elaborate cybercriminal operations may distract their attention, perhaps it would be better placed in establishing greater accountability for those w...
Alarming Research
According to the 2010 Annual Study: U.S. Cost of a Data Breach by Poneman Institute, a Michigan-based research center that studies privacy, data protection and information security policy, security breaches cost $214 per compromised record and average $7.2 million per data breach ...
The major obstacles that must be overcome to effectively share data between partners are:
Different security format standards
Different operating system or hardware platform
Different security policies
The use cases below explore each of these obstacles:
Use Case #1: Partner chooses secu...