BLOG

Rethink Data Management Practices for CCPA, GDPR and Beyond

[Part 1 of a 3-Part Blog Series] One of the big differences between privacy and security regulations is the role they give technological solutions as part of the compliance effort. Security regulations speak of tools, technical controls, and automated solutions to enable the protection of data. Privacy regulations, on the other hand, are written as […]

Read More

Welcome to The Pulse

The Story Behind Our Stories “The Pulse,” I’ll admit, could be the name of practically any company’s newsletter. We could have called it “The Beat,” “The Bulletin,” or my personal favorite from circa 1997, “Connections.” But this name is particularly relevant for Dataguise, given what we do for our customers, and it has everything to […]

Read More

Monthly Breach Report: November 2019 Edition

As data breaches continue to raise its ugly head all across the globe, let’s take a look at few of the most prominent ones that occurred last month. 1. Adobe October 25, 2019: California-based computer software enterprise Adobe publically acknowledged they unintentionally exposed the personal information of approximately 7.5 million Creative Clouds accounts to the […]

Read More

Monthly Breach Report: October 2019 Edition

Data breaches have become the biggest curses of the Internet age. While they are a nightmare for consumers, it impacts organizations as well. Here are the biggest data breaches from last month to hit news headlines. 1. DoorDash September 26, 2019: A massive data breach marred about 4.9 million DoorDash users when a hacker stole […]

Read More

Data Subject Access Requests (DSARs): As Important as Payroll?

  A Big Deal for Companies Managing Data Subject Access Requests (DSARs) is a global challenge that continues to grow as more privacy regulations give individuals the right to see what information companies keep about them and to request updates to it, or even its outright deletion—which is known as the right to be forgotten […]

Read More

Monthly Breach Report: September 2019 Edition

Data hacks have become an unfortunate reality that’s happening all over the world. Despite the advances made by security experts, the breaches of last month show that organizations must do better when it comes to data security. Here are some of the top trending breaches to hit news headlines last month. NPP Australia August 21, […]

Read More

Addressing Data Governance Challenges in Retail

Over the past decade, the retail industry has undergone significant transformation and continues to evolve. Among a series of changes that have impacted the retail landscape, the role of data has been one of the most significant. For retailers, data has always been integral to making intelligent business decisions; however, increasing data types and volumes […]

Read More

Monthly Breach Report: August 2019 Edition

1. National Australia Bank (NAB) July 29, 2019: A data breach shook NAB after the names and contact information of approximately 13,000 clients were accidentally disclosed with two data service enterprises. NAB, Australia’s fourth-largest financial institution, acknowledged that this is the second significant leak of customer data that the banking major encountered within three years. […]

Read More

Decoding the What and Why of Top Data Catalog Capabilities

In today’s digital world where data is everywhere, enterprise data catalogs have become a “must-have” asset within information architectures. While some years back, it was considered more of a “nice-to-have”, over time things have changed significantly. Why is that so? Nowadays, most businesses gather enormous amounts of data, sometimes in various data formats, making it […]

Read More

Another Data Breach? Don’t Blame the Cloud

The recent breach at Capital One brings to the forefront the concerns companies have about moving personal information to the cloud. It shouldn’t. The incident, which involved a rogue former employee of AWS, suggests the conditions that allowed the breach to manifest are not necessarily related to where the data was hosted, but how it […]

Read More