Blog

Layers of data access — business, service provider, and third party

Take it from Shrek…onions, ogres, and organizational data all have layers. Okay, I may have added that last one in, but it’s true! There are layers…

Read More »

What can we learn from the Strathmore College breach?

You may have heard me say before that your cybersecurity is only as strong as your team. And your team is made up of real humans…

Read More »

Privacy Laws Popping Up in Different States

Did you know that it’s illegal to share your Netflix password in Tennessee? It might sound crazy, but thanks to the 2011 “Login Law” it’s absolutely…

Read More »

What Can We Learn From The Adobe Hack?

Does a skeleton key have any place in cybersecurity? This might seem like an obvious answer to some, but you’d be surprised by the corporate giants…

Read More »

1997 vs Now: Real Names & Screen Names

Remember 1997? It was the year that gave us Titanic, MmmBop, and a clear winner at the forefront of a brand new technology: AOL Instant Messenger….

Read More »

Data Lakes

Do you have a data lake or a data swamp on your hands? For #datanerds like me, it’s interesting to see how collecting data is rarely…

Read More »

Transform your data ecosystem

Pursue global, data-driven marketing campaigns with the metrics, teams, and processes you need for maximum impact.