Business Intelligence

sensitive data binary

If Security and IT Aren’t Talking, Your Sensitive Data is Suffering

I live near an intersection ruled by four-way stop signs. Driving through it often becomes an awkward experience. Some people stop for longer than necessary, disrupting the usual order while gesturing for other drivers: “No, you go.” Others blow through […]

If Security and IT Aren’t Talking, Your Sensitive Data is Suffering Read More »

risk management US Capitol

Three Reality Checks for Compliance and Risk Management in 2017

As the transition to a new Presidential administration unfolds, uncertainty abounds. Predictions about the regulatory landscape made before November may not ring as true, as Republicans look to make good on promises about smaller government and regulatory reform, particularly in

Three Reality Checks for Compliance and Risk Management in 2017 Read More »

credit fraud

Human Identifiers Power Data Protection in the War on Rising Card Fraud

There’s a security revolution underway in the United States. In an attempt to reduce credit card fraud, retailers everywhere are transitioning from legacy magnetic strip cards to the more secure chip-and-PIN system. Under this new threat cyber criminals are picking

Human Identifiers Power Data Protection in the War on Rising Card Fraud Read More »

customer-centric

Three Real-Life Examples of the Customer-Centric Model at Work (and Working Very Well)

As the customer-centric approach has gained steam, business owners the world over have been intrigued by the purported benefits. But the big question hovers for many—does this approach really work? Well, the answer depends on how you think corporations like

Three Real-Life Examples of the Customer-Centric Model at Work (and Working Very Well) Read More »

Scroll to Top