Evelyn de Souza

Evelyn Min 180x180

The Companies That Know The Most About You

November 3, 2020

The Tracking Era (Updated: 11.03.2020) Right now privacy is a hot topic on LinkedIn posts, especially as it pertains to compliance with the General Data Protection Regulation. As a board advisor at Universal Patient Key, we’ve often talked about why being

Read More
Evelyn Min

The First Steps on a CISOs DevOps Journey

August 27, 2018

CISOs DevOps The marriage between DevOps and Security is rapidly gaining traction. Security is shifting from its former mindset of being its own silo to getting on the same agenda as their developer counterparts. For CISOs the opportunity to get

Read More
Evelyn Min

Why Information Security Need to be Empowered to Manage Data Breaches

July 11, 2018

Manage Data Breaches 2017 saw over 2 dozen major security breaches in 2017.  While the public may have grown numb to the number and constant stream of data breaches reported, outrage has been building around the delays in accompanying disclosures of

Read More
Medical

Why Trust Versus Security and Privacy, Is Holding Back Innovation with Medical Data

January 10, 2018

Innovation and Medical Data As healthcare organizations continue to sift through attempt to maximize the potential of the massive collections of health data, trust has become the polarizing topic. Understanding how professionals in the supply chain (doctors, hospitals, insurers) collect, use

Read More
Evelyn Min

THE AGE OF DATA: THE ERA OF HOMO DIGITUS

August 4, 2016

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction

Read More
Evelyn Min

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

May 25, 2016

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to

Read More

Resurrecting CHAOS (Controlling Havoc and Overhauling Security) for Today’s CIOs

April 19, 2016

Resurrecting CHAOS for Today’s CIOs and CISOs While at CloudExpo, London last week I had the chance to chat to RedHat’s Richard Morell. He suggested that I resurrect CHAOS (Controlling Havoc and Overhauling Security) Theory from a couple of years

Read More
Evelyn Min

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

March 9, 2016

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And,

Read More

Destroying Data In The Age Of Data Multiplication

February 16, 2016

The Age of Data Multiplication We are surrounded by data, whether in our personal or professional lives with digital elements that are constantly being captured about us. This leads to exponentially increasing volumes of data whether from Internet-connected devices, video,

Read More
Evelyn Min

The Meaning Of Secure Business Agility

January 20, 2016

Secure Business Agility As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather

Read More
Evelyn Min

Principles For Data Protection Online

December 9, 2015

Data Protection In The Cloud 2015 ushered in the start of a data economy. As organizations amass more detailed consumer profiles they have begun realizing that data could equal or surpass the value of the products and services they sell,

Read More
Evelyn Min

How To Overcome Data Insecurity Online

November 6, 2015

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a

Read More
Cloud Practice

What Data Breaches Should Spell To Security Practitioners

October 13, 2015

Cloud Security Practitioners And Auditors Today we have seen relatively few data breaches in the cloud despite its growing use for mission-critical workloads. However, as cloud increasingly becomes the backend for our mobile devices, for the Internet of Things (IoT)

Read More
Evelyn Min

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

September 15, 2015

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on

Read More
Big Data Collect

Hoarders And Data Collectors: On The Brink Of Unmanageability

August 13, 2015

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose

Read More
Steve Prentice
The Era of Microlearning Becoming employable and then staying employable requires ongoing, up to date knowledge, and this can become something of a dilemma. Many of us grew up with a traditional understanding of the ...
Gary Bernstein
The Dangers of Facial Recognition Technology Facial recognition technology has become increasingly prevalent in our daily lives, from unlocking our phones to boarding airplanes. While this technology may seem convenient, its implications go far beyond ...
Frank Suglia
Migrating Microsoft Office 2013 As of April 11, 2023, Microsoft will stop supporting Office 2013. The decision to end support for Office 2013 should come as no surprise. Over the past several years, Microsoft has ...
Josh Miramant
Benefits of a Data-First Culture When it comes to analytics solutions, centralization versus decentralization is one constant tension that’s plagued data architects for years now. Both options offer their own sets of advantages and disadvantages, ...
10 Leading Open Source Business Intelligence Tools
Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up the decision-making process. Open Source Business Intelligence Tools make it easier to have our raw ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Jen Klostermann
The Fintech Landscape The Nitty Gritty Although the COVID-19 pandemic has highlighted its existence, most of us have been using fintech in some form or another for quite some time. It’s a big part of ...