Systems | Development | Analytics | API | Testing

SOA vs. Microservices

Most individuals who work in technology — and in particular, cloud computing — are likely aware of how service-oriented architecture (SOA) and microservices work. There is much discussion, however, regarding the best approaches for various situations. There are crucial differences in data governance, component sharing, and the architecture between SOA vs. microservices. In this article, you'll learn the basics of SOA vs.

The Official 2021 Checklist for HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a U.S. federal law. It sets national standards for health care providers to maintain the privacy of patients' protected health information (PHI), including electronically protected health information (ePHI). If you collect, store, or process any kind of patient or medical data, you need to be aware of HIPAA and how it affects your operations. But what does it really mean to be HIPAA compliant?

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.

A Guide to Data Privacy and Data Protection

Organizations collect and use personal data for a variety of purposes, often without considering the impact on data privacy. Individuals are increasingly more aware of how their data is being used and the lack of say they have over the process. Data privacy and protection regulations are in place around the world to protect consumers and stop their personal information from being misused.

6 Mistakes to Avoid When Handling PII

Personally identifiable information, or PII, is sensitive information that can identify an individual. Industry or data protection laws often regulate this type of data, requiring that organizations handle PII according to specific practices. It’s all too easy to make mistakes when working with PII, so we've highlighted six common scenarios to look out for.

BI Compliance: Can a Restructure Deliver Enhanced Data Privacy?

Every data-driven business is terrified of the prospect of a data breach. Exposing sensitive data could mean reputational damage, loss of clients, and heavy fines under emerging privacy laws. But every data-driven business also wants to make use of its data. Business intelligence (BI) platforms allow anyone to build complex and detailed dashboards that help them understand the organization’s current state. How do you resolve this tension? One approach is to build a privacy-first data structure.