Search for:
Data Governance Gets a New Impetus
Data governance has often been met with furrowed brows among CIOs — sometimes seen as the broccoli of the IT dinner plate: undoubtedly good for you, but not always eagerly consumed. CIOs often bore the brunt from organizations that were forced to do top-down data governance. With this said, defensive data governance has been a […]


Read More
Author: Myles Suer

Explaining the Why Behind Data Quality Dimensions
Data quality is measured across dimensions, but why? Data quality metrics exist to support the business. The value of a data quality program resides in the ability to take action to improve data to make it more correct and therefore more valuable. The shorter the amount of time between the discovery of the data quality […]


Read More
Author: Allison Connelly

The Rise of Zero-Trust Architecture
The cybersecurity landscape in 2024 is marked by complex, multi-faceted threats, necessitating advanced defensive strategies. This complexity arises from the expansive use of digital technologies and the corresponding increase in attack vectors. This evolution demands a nuanced understanding of threat patterns and the adoption of more sophisticated defense mechanisms. The focus now is not just […]


Read More
Author: Ben Herzberg

The AI Playbook: Providing Important Reminders to Data Professionals
Eric Siegel’s “The AI Playbook” serves as a crucial guide, offering important insights for data professionals and their internal customers on effectively leveraging AI within business operations. The book, which comes out on February 6th, and its insights are captured in six statements: — Determine the value— Establish a prediction goal— Establish evaluation metrics— Prepare […]


Read More
Author: Myles Suer

A Halloween Tale That Turns Non-Invasive
Once upon a dark and eerie night, in the heart of the bustling city, there lived a data governance practitioner named Victor. Victor was known for his sharp mind and forward-thinking ideas, but he faced a daunting challenge: convincing his old and set-in-their-ways management that non-invasive data governance was the least scary of alternatives to […]


Read More
Author: Robert S. Seiner

Self-Service Data Access Best Practices
Today’s digital realm increasingly emphasizes the value of self-service data access. Firms are recognizing its potential to empower users and accelerate decision-making processes. However, with this rapid shift towards democratized data access come challenges that organizations need to address. One central conundrum confronts businesses: How can they provide expansive data access while ensuring that information […]


Read More
Author: Ben Herzberg

The Role of IT in Data Governance
Information technology (IT) plays a vital role in data governance by implementing and maintaining strategies to manage, protect, and responsibly utilize data. Through advanced technologies and tools, IT ensures that data is securely stored, backed up, and accessible to authorized personnel. IT also enforces data governance policies and procedures, such as data classification and access […]


Read More
Author: Sudeep Srivastava

Unique Threat Landscape of Digital Divide
Rural areas worldwide are disconnected in a landscape that nearly requires the internet to work or socially interact. But eventually, the entire planet will have equal, high-speed internet access. Neglecting the digital divide and broadband gap will cause cybersecurity concerns for communities entering the digital era. Regions new to the internet are more vulnerable. Therefore, […]


Read More
Author: Ellie Gabel

Raw Data as the Precursor to Everything Data
The world revolves around data. Just about any important decision organizations make depends on the data they have. Data helps organizations mitigate risks, plan marketing campaigns, devise research-backed strategies, and tons more. But a resource this valuable has rather humble, or jumbled, beginnings. What is Raw Data? Raw data is the primary form of data. […]


Read More
Author: Bala Adalarasan

Best Practices for Migrating Applications to the Cloud
It is no secret that cloud migration and transformation helps your business attain desired growth, cost savings, agility, and profitability. With these, your team is able address customer needs faster, monitor app performance, and scale applications according to demand. App migration can be time-consuming, and you cannot afford to mess with the process. And a […]


Read More
Author: Rebecca Grey

Where Data Governance Must Focus in AI Era
In today’s rapidly changing and advancing world of artificial intelligence (AI), generative AI, and large language models (LLMs), data has become the lifeblood of innovation. Data fuels algorithms, powers decision-making processes, and shapes the future impact of technology. By formalizing existing levels of accountability (truly a non-invasive approach), respecting people’s privacy, promoting ethical practices, and […]


Read More
Author: Robert S. Seiner

Collaboration Between Digital & Human Worlds
The role of semantics in connecting logical performance-driven functions with the lexical (linguistic) functions across any interaction between humans and machines through artificial intelligence (AI) technologies have witnessed significant headwinds in recent years. Despite the abundance of historical data or contextual information, AI solution providers have struggled to augment humanistic values into key decision-making processes […]


Read More
Author: Dr. Walid el Abed

Effective Use of Generative-AI
While Generative-AI has undoubtably demonstrated powerful capabilities in generating images, music, and text, it is essential to approach the technology’s potential with a balanced and realistic outlook. The notion that Generative-AI will serve as a universal panacea for all industries is overly optimistic. The true value lies not in the technology itself, but in how […]


Read More
Author: Robert S. Seiner

Privacy, Security & Machine Learning
Data privacy and security matter. Given this, it will be a big deal if machine learning can make them easier to implement. So, how do CIOs and other security thought leaders think machine learning applies to privacy and security? Let’s start by looking at the risks and then discuss how technology makes addressing them easier. […]


Read More
Author: Myles Suer

Protect Data Without a Password
In an increasingly interconnected world, cybersecurity is of the utmost importance for many businesses. In fact, poor security isn’t just a hit to your reputation, it can also be expensive. Businesses of all sizes are looking for ways to mitigate these costs and prepare for cyberattacks. Password-less authentication is one such approach businesses are taking […]


Read More
Author: Ainsley Lawrence

Boost E-Commerce with Customer Verification
Data breaches have been rampant these days, and many companies realize they need to enhance their customer verification process. Proper customer verifications help prevent young children from accessing products and services that are age sensitive. It also prevents fraudulent transactions from happening online. Businesses have different options to address this issue to reduce the risk, […]


Read More
Author: Juliette Anderson