What Is a Data Catalog? Scope, Value, and More

…and protection regulations One of the inescapable realities of data lifecycle management is adapting to new regulations. The ability to appropriately discover and label your data is the only way…

Update on Apache Log4J (Log4Shell) Vulnerability

…Log4j is a java library used broadly across enterprise software and cloud applications, including Amazon, Apple iCloud, Tesla, Twitter, RedHat, Micecraft, and more. CVE-2021-44228 is an Apache software vulnerability in…

CPRA: Employees and the New California Privacy Law

…assessing and responding to Employees’ rights requests quickly by fulfilling the request or determining whether an applicable exception applies. Businesses will need to develop a detailed process to govern employee…

Data Governance Innovation in Financial Services

…data quality is an inherent function, so instead of having application owners and IT teams develop and maintain those applications from scratch, Power has implemented systems to assist. “It’s essentially…

5 Steps for Effective Data Security Governance

…control that requires users to provide multiple forms of authentication to access a system or application. For example, a user might be required to enter a password and provide a…

5 Essential Steps for Protecting Online Privacy

…devices, operating systems, and applications up to date with the latest security patches and updates. This helps protect against known vulnerabilities that hackers can exploit. Enable automatic updates whenever possible….

The EU AI Act: All You Need to Know in 2024

…a risk-based approach to regulation, categorizing AI applications into four levels. This means the higher the risk, the stricter the governance. Unacceptable Risk: An AI system that’s categorized as an…