Security. Security are the controls that protect data from unauthorized users. Security is often associated with information systems and technology hardware and software. From a security operations perspective, the cloud...
Consent. Let’s begin with the first thing that must be present. You cannot get very far without consent or permission from the people you’re collecting data from. Mitigating cyber or...
An earlier post talked about data privacy in cloud-agnostic settings. This post builds on that post while involving the cloud, which is everywhere these days. Companies want the cloud because...
It isn’t surprising that as the web has made it easier to collect data, but so have data laws proliferated. Data is vulnerable to a plethora of risks, so having...
You’ll find this site useful if you are interested in technology, security, data, and research. This site is a space where I post best practices and lessons learned from past...
Site maintained by johnresearches