Executive Update

Data-Centric Security and Protection, Part II: Major Threats and Sensitive Data

Posted January 11, 2017 | Technology |

In Part II of this series, we examine survey findings pertaining to the biggest perceived threats to sensitive data protection efforts as well as issues and concerns for protecting data in cloud platforms and applications.

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.