Learn how data protection legislation is changing around the world and the 10 steps database teams can take to ensure compliance and defend against data breaches.
Got a favorite story of unusual, unique, or inspired attempts at data privacy. We'd love to hear them on DBAle's data privacy contest. Share your story for the chance to win a box of beer and the glory of getting your name on DBAle
Security is, or at least should be, the priority for any IT system. In this article, Cynthia Dzikiti discusses the security aspects of ERP systems and some of the techniques used to protect data.
Ever since the GDPR was introduced, the subject of data breach notifications has worried a lot of people. How do you write one? What do you need to include? What will the ramifications be? Will it make your customers run for the hills? Will it get you fired?
To better understand influence attacks, the Berkman Klein Center for Internet & Society proposed an approach that models democracy itself as an information system and explains how democracies are vulnerable to certain forms of information attacks that autocracies naturally resist.