eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Microsoft is eliminating a blind spot for businesses ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Auditing database activity is a core component to any data security program. Databases capture data access and alterations during transaction processing, along with modifications to the database ...
The Institute of Internal Auditors has published a new guide to help auditors deal with the challenges of “big data,” the huge volumes of structured and unstructured information that’s being generated ...
In today’s rapidly evolving digital landscape, technology is no longer a differentiator for finance organizations—it’s a ...
Many seasoned database administrators howl in protest at the mere suggestion of running native auditing functions due to the poor performance and log management headaches that often come with auditing ...
In this, the first in a two-part series, we walk through the initial steps businesses need to take to mobilize their data: a data audit and data consolidation. It has been argued that “data is the ...
In an effort to make the audit process more efficient and effective, the AICPA Assurance Services Executive Committee (ASEC) has developed voluntary audit data standards that would standardize the ...
Data security, once the realm of the IT department, has catapulted into a headline-grabbing topic in 2018, especially in light of Facebook CEO Mark Zuckerberg’s testimony before Congress in April.
Big Data is powerful. It can also be daunting. The current data analytic landscape focuses on the use of “scripts” that can identify duplicates and quantitative outliers. Yet, there is little guidance ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results