When the Federal Government needs to be optimizing tax dollars for government systems, how does an effective CIO make the choice of when to migrate mainframe applications to the cloud?
The end users of disguised data—the testers—in a test data privacy project typically have two objections to how pseudonymization affects test data quality. The first objection is easily handled, but the other must be delicately approached with the right solution.
Test environments are vulnerable against GDPR legislation, and therefore, action must be taken to desensitize test data and improve data protection. More than likely, a lot of IT organizations need to be thinking of how to start a test data privacy project.
The EU General Data Protection Regulation legislation has been published in the Official Journal, making it a valid law in all 28 EU countries, and it’s coming into full force two years from today on May 25, 2018.
Until recently, data controllers maintained sole responsibility for upholding EU data protection laws, and made sure data processors they partnered with followed suit. However, under the EU’s newly adopted GDPR, data processors will no longer be free of liability for breaking data privacy laws, and will share with data controllers the onus of data protection for EU citizens.
The GDPR is making data protection more complex for companies. The coding of data masking rules for each and every column (field) is a redundant task. Data Elements solves this problem by reducing the complexity and tedium involved.
If a breach happens after a review of access to data assets, you need to identify the employees involved and resolve it as quickly as possible. Your ability to respond in reasonable time will be considered when penalties are decided for the General Data Protection Regulation (GDPR), so it’s a wise move to consider how quick response time can be achieved.
The General Data Protection Regulation (GDPR) is increasingly causing headaches for senior IT management. In the media the main focus is on consent, but there are many other areas that need attention. One of them is testing.
Attribution: mthierry Software breaches caused by flaws in software are meat and drink for the IT and national press. Barely a week goes by without another announcement of sites being hacked and passwords stolen. At the heart of this are software developers who, if the press is to [...]
Virtual Private Network companies have long promoted themselves as a way to surf the web while protecting your anonymity from potential snoopers. Traditionally VPN users have therefore been perceived as file-sharing pirates or individuals living under regimes that heavily censor the web. But in recent years, the unrelenting war against [...]
Compuware recently presented the webcast, Protect Sensitive Data in Test, Protect Your Business First, some background. The responsibility for properly managing test data tends to fall into the hands of IT. To properly test an application, the data it processes should be as close to “real” as possible. But discovering the [...]