By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

TDWI Articles

Data Digest: Data Hoarding, Responding to Data Breach, Open Source Security Forecast

Learn to limit storage of unnecessary data, how to recover after a data breach, and what 2017 holds for open source security.

The Problems with Data Hoarding

Cheap storage and easy data creation have combined to create a systemic issue: data hoarding. Simply put, too much worthless data is being kept. How can your enterprise identify what stored data has value and what ought to be let go?

Read more at Information Age


Coming Back After a Data Attack

Even the best security systems in the world cannot stop every attack. Sooner or later, your enterprise is likely to be hit. An effective post-attack plan can mitigate the impact.

Read more at Business 2 Community


The Next Year in Open Source Security

The convenience of open source has made it ubiquitous. Your enterprise is likely among the 95 percent using open source in some capacity. Knowing what the future holds for open source will help you secure your enterprise.

Read more at IT Pro Portal


About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.