CLOUDTWEAKS DEMAND GENERATION

Each year we provide a few highly customized demand generation opportunities to partners and going into our 10th year at CloudTweaks is certainly no different. We are on the lookout for technology vendors to collaborate with on a number of initiatives in 2019. 

Sponsorship opportunities will be available for all budgets and sizes including the (premium) thought leadership exposure program or the webinar, podcast, white paper or explainer video lead generation program. 

Ankur Laroia

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding

The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation that 80% of content most businesses have is unstructured. A general lack of understanding of how to manage the data and a reluctance to delete content, leads to ‘data hoarding’ and businesses seem unaware of what data is present and what value it holds. There is also confusion regarding management and governance.

Scattered content, regardless of where it is stored, poses a major security risk. Most businesses are unaware which data set is sensitive and will likely not have adequate measures in place to secure it against cyberattacks. Any security technology that is implemented to keep data secure cannot be effective unless it is clear what data is of value. For this reason, document classification must dovetail with security processes to identify, record, and potentially encrypt content in order to keep it safe both within and outside the firewall.

data hoarding

Unless companies embrace the power of open thinking and a new pragmatic approach to security, data breaches are going to become the “new normal”, leaving companies to deal with the inevitable fall-out and impact on brand reputation. Every business is now contending with the interplay between making information instantly accessible to a range of users and keeping it secure against malicious attacks.

Information stewardship is the key to maintaining a hold on the burgeoning data in today’s digital age, using individual business insights to inform decisions to implement processes that streamline the flow of data and improve user experience. Content must be correctly identified, categorised and deleted (where appropriate) to keep the problem of data proliferation from spiralling out of control. These decisions must be made by agreements between both high level executives and IT departments. Information stewardship cannot be solely the responsibility of either, and should instead be a cohesive approach. A successful breach could have lasting financial and reputational ramifications and so this internal collaborative approach has to be a priority and shared responsibility.

When identifying a solution to the problem of data hoarding, businesses must also keep the end users in mind and implement processes that allow them to access the content they need, when they need it, to ensure a smooth workflow. The solution must also allow collaboration to facilitate innovation and improve efficiency. Putting users’ requirements at the centre of the process ensures the best compliance with processes. In turn this streamlines and secures data.

To address the challenges that businesses face, an enterprise grade platform is needed rather than a product that has been fitted for use, to at once provide agility but must be constantly updated. Platforms that are Open Source, with thousands of “white hats” who can help fight the “black hats,” will help companies secure their most precious resource – intellectual property. Transparent, open systems by their very nature are hardened to prevent future breaches. For every new encryption or password management point solution enterprises put in place, there are likely hundreds of hackers (many from state actors) figuring out a way to compromise those security countermeasures. Enterprises need more brainpower to stay one step ahead; otherwise, they are just going to experience these breaches over and over again.

The deluge of data shows no signs of abating. Managing and extracting intelligence from data that is growing in silos will remain a challenge – not only will this information decrease in value, it will hamper decision making and increase in risk. Embracing open thinking and information stewardship will enable content to be identified, classified, curated, and governed throughout its lifecycle. Thus promoting business agility, better decision making and reducing the risks of data hoarding.

By Ankur Laroia

Ankur Laroia

Ankur Laroia serves as Leader – Solutions Strategy at Alfresco, where he leads, guides and directs the application of the latest Enterprise Content Management and Business Process Orchestration technologies. Ankur is a recognized thought leader and expert in the disciplines of business transformation and information technology (IT) strategy. Ankur has advised many of the Global 2000 with regards to Enterprise Information & Content Management, Enterprise Resource Planning, Enterprise Application Integration strategies and business architectures.
As an active technology leader for over 20+ years, Ankur has served as President of the Integration Consortium and co-chair of many industry advisory boards and panels. He is a patent contributor, author, technical editor and speaker at technology conferences worldwide. His formative works in the disciplines of technology architecture and integration have been referenced by graduate students in their dissertations at top-tier universities such as MIT, Carnegie Mellon and Stanford. His works have also been cited in peer reviewed journals such as the Journal of Theoretical and Applied Electronic Commerce Research. Ankur currently serves on the advisory boards of Vert Solar and Narrative Builders.

View Website

RESOURCES

Infographic - Internet of Things (IoT) Will Be Top Technology Investment

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply way too much money at stake to ignore the potential that is going to truly ...
Machine Learning Open-Source Tools

Do More With Machine Learning Thanks to These 6 Open-Source Tools

Machine Learning Open-Source Tools We are in the middle of a machine learning, AI and big data renaissance — at least, that’s what we’re calling it. Seemingly everyone is interested in this technology these days, and for a good reason ...
20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

Cloud CMS Wordpress Alternatives Content management systems (CMS) have grown exponentially in recent years. Their number and features have exploded. There are now dozens of cloud CMS Wordpress alternatives for startups and small business. CMS is getting more sophisticated. Website building ...
DevOps

DevOps

FIRST THINGS FIRST. WHAT ARE MICROSERVICES? Microservices are an engineering approach and architectural style of computing that is becoming extremely important for organizations wanting to innovate through a stronger engagement with their ecosystem of customers, suppliers and partners. To explain ...
[Free White Paper] Global Mid-Year Threat Landscape Report > Dive into the three major threats of mid-2018

[Free White Paper] Global Mid-Year Threat Landscape Report > Dive into the three major threats of mid-2018

[Free WhiThe use of unknown or unpatched software vulnerabilities in advanced attacks is key to threat actors, as it allows them to infiltrate organizations or distribute malware en masse to vulnerable systems. Download the free white paper now to learn ...
How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to work with, but do you know what will help tip the scales in your favor? ...

CONTRIBUTORS

The New Kids On The Block: Data Protection Officers

The New Kids On The Block: Data Protection Officers

Data Protection Officers The General Data Protection Regulation (GDPR) is officially here. Yet, organizations are still unaware, are ignoring, or ...
Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial ...
Critical Success Factors when shifting Workloads into the Cloud

Critical Success Factors when shifting Workloads into the Cloud

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain ...
Marty Puranik

HIPAA Risk Assessment Guide for Smaller Practices

HIPAA Risk Assessment Guide Disconcertingly, one in four practices (25%) are failing meaningful use audits by the Centers for Medicare ...
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
Matthew Cleaver

Dispelling the Myths of Cloud Solutions for the Small Business

Dispelling the Myths of Cloud Solutions As a business leader, migrating to the cloud can be overwhelming due to the ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry ...