Protecting Data is Good. Protecting Information Generated from Big Data is Priceless

This was the key message that came out of The Open Group® Big Data Security Tweet Jam on Jan 22 at 9:00 a.m. PT, which addressed several key questions centered on Big Data and security. Here is my summary of the observations made in the context of these questions.

Questions for the Upcoming Big Data Security Tweet Jam on Jan. 22

Last week, we announced our upcoming tweet jam on Tuesday, January 22 at 9:00 a.m. PT/12:00 p.m. ET/5:00 p.m. BST, which will examine the impact of Big Data on security and how it will change the security landscape. The discussion will be guided by these six questions…

Data Governance: A Fundamental Aspect of IT

Underlying both SOA governance and Cloud governance is a fundamental aspect that we have been dealing with ever since the dawn of IT—and that’s the data itself. Let us challenge ourselves with a few questions. Consider them the what, why, when, where, who and how of data governance.

Data Protection Today and What’s Needed Tomorrow

Technology today allows thieves to copy sensitive data, leaving the original in place and thus avoiding detection. Published in October 2012, the Jericho Forum® Data Protection white paper reviews the state of data protection today and where it should be heading to meet tomorrow’s business needs.