Quantcast
Channel: Information Security – The Informatica Blog – Perspectives for the Data Ready Enterprise
Browsing latest articles
Browse All 7 View Live

Image may be NSFW.
Clik here to view.

Secure@Source Version 2: Data Visibility, Risk and Financial Impact

I don’t think I’m overstating anything by calling the next 10 years “The Decade of Data” –  data of every variety, volume and use proliferates to meet the insatiable demands of analysts, executives,...

View Article



Image may be NSFW.
Clik here to view.

Why You Need Data Security Intelligence

Have you ever stopped to think about the sheer amount of information that your brain collects and processes to make decisions? What do you notice and why? And how and when do you recognize risks rather...

View Article

Image may be NSFW.
Clik here to view.

“Where Is My Data?” (And other terrifying questions facing security...

Survey Results: What issues are most top of mind for CISOs Where Is My Data? As a security professional, I can attest that the lifeblood of any company is the sensitive data they process. To be useful...

View Article

Image may be NSFW.
Clik here to view.

Data Security Survey by Informatica, Scale Ventures and Ponemon

Data Security SurveyWhen it comes to sensitive data, what you don’t know will hurt you; and ignorance is not bliss. Informatica, Scale Ventures and Ponemon Institute concluded their survey on data...

View Article

Image may be NSFW.
Clik here to view.

Information Security in the Age of Big Data

The Age of Data Information Security in the Age of Big Data The 21st Century is, without a doubt, the Age of Data. In fact, some would say, it is the Age of Big Data. Data is everywhere and everyone is...

View Article


Image may be NSFW.
Clik here to view.

Receive Expert Data Security Guidance at Informatica World 2017

The dynamic world of hybrid computing creates tremendous opportunity for organizations to share, analyze and monetize their data. Unleashing the wealth of information in vast data stores provides...

View Article

Image may be NSFW.
Clik here to view.

Critical Capabilities for Detecting Insider Threats and Protecting Sensitive...

Sensitive data is at the heart of all data breaches and protecting it is among most organizations’ top priorities. But why is protecting the data crown jewels so difficult? Firstly, regardless of...

View Article
Browsing latest articles
Browse All 7 View Live




Latest Images