Identity & Access Management

2013 and 2014 were major years for IAM awareness in both government and industry.  The Snowden leaks helped teach government agencies the value of limiting individual access to vast troves of information.  In the private sector space Target’s credit card breach cost the company 46% of its fourth quarter profits and litigation for more than…

Information Portability and Control

Information is the ultimate currency of any organization.  Protecting that information so the right message is released to the right audience at the right time is the responsibility of each individual in that organization.  In some sectors mishandling of information can lead to life threatening security concerns.  In most cases though information mishandling leads to…

Data Mining & The Cognitive Hierarchy

Data Mining is somewhat of a misnomer term used to describe the discovery of patterns within a dataset as opposed to finding the actual data in a dataset.  “The types of patterns decision makers try to identify include associations, sequences, clustering, and trends” (Kendall, 2013).  One way to understand how this works it to look…