Kathy Coe

Behind the Firewall – The Insider Threat, Part 2

As you read in Part 1 of this article, some of the most devastating threats can come from insiders. "Insiders," as we have defined them, include anyone with access...

Behind the Firewall – The Insider Threat, Part 1

Your security program is only as strong as its weakest link, and that is where the human element comes into play. Even if you have very comprehensive IT security...

Latest Posts

How is Big Data Evolving?

In 2013, Judith Hurwitz and other market experts proclaimed the beginning of the Big Data Era. They perceived that “big data enables organizations to...

SAP’s Irfan Khan on ‘Analytics Everywhere’

I spoke with Irfan Khan, president, HANA Database & Analytics at SAP, about the value of an end-to-end technology platform that incorporates analytics throughout. Among...

Komprise Co-Founder Krishna Subramanian on Data Management-as-a-Service

I spoke with Krishna Subramanian, co-founder and president, Komprise, about using Data Management-as-a-Service to manage data in a multi-cloud environment. What are the big...

Why Apple’s Enterprise Efforts Always Fail

Apple is again making a run at the Enterprise, and Forrester has released a report indicating companies could save around $300 a year in...

Tableau’s Philip Cooper on Data Analytics ‘Available to All’

Philip Cooper, VP of Product, Tableau, discusses the trend toward making data analytics tools available to employees throughout the organization, not merely the C-suite.  Among...