Got a favorite story of unusual, unique, or inspired attempts at data privacy. We'd love to hear them on DBAle's data privacy contest. Share your story for the chance to win a box of beer and the glory of getting your name on DBAle
Security is, or at least should be, the priority for any IT system. In this article, Cynthia Dzikiti discusses the security aspects of ERP systems and some of the techniques used to protect data.
Ever since the GDPR was introduced, the subject of data breach notifications has worried a lot of people. How do you write one? What do you need to include? What will the ramifications be? Will it make your customers run for the hills? Will it get you fired?
To better understand influence attacks, the Berkman Klein Center for Internet & Society proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable to certain forms of information attacks that autocracies naturally resist.
More and more data is being captured and analyzed all the time. At the same time, there are varying expectations of privacy that aren't always shared between the subjects of data and the collectors. Steve has a few thoughts on how this will play out for data professionals.