We’ve described the processes for implementing a data security practice; a list of critical digital assets, a threat and vulnerability assessment, and documentation of governance and regulatory requirements. Now we will use these artifacts to synthesize a prioritized security strategy.
Digital transformation is key to business success but is also a major vulnerability when it comes to data privacy. Learn about the approaches, methodologies, and technology that can help you face privacy challenges during your digital transformation.
There is a lot more data at risk today than there has been in the past. The explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it.
KuppingCole’s Leadership Compass for Access Management and Federation report provides an overview and analysis of both traditional Web Access Management and Identity Federation. Micro Focus Access Manager does well in this review because the report does a good job vetting out all the different ways that organizations use the gateway.
In the last post in my series on Data Security, we defined a process for identifying critical assets and intellectual property that are worth protecting. Now it’s time to discuss the second process, namely evaluating threats against and vulnerabilities of these identified critical assets.