Systems | Development | Analytics | API | Testing

Analytics

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.

How Analytics is Becoming as Simple and Reliable as Electricity

At the Modern Data Stack Conference EMEA, Fivetran's VP of EMEA Nate Spohn provides the keynote address with added discussions with Bob Muglia, Investor and former CEO at Snowflake; Alex Billar, VP of Platform, EMEA; and Magnus Carlsson, VP & Head of Innovation I&D Nordics, Capgemeni.

A Guide to Data Privacy and Data Protection

Organizations collect and use personal data for a variety of purposes, often without considering the impact on data privacy. Individuals are increasingly more aware of how their data is being used and the lack of say they have over the process. Data privacy and protection regulations are in place around the world to protect consumers and stop their personal information from being misused.

6 Mistakes to Avoid When Handling PII

Personally identifiable information, or PII, is sensitive information that can identify an individual. Industry or data protection laws often regulate this type of data, requiring that organizations handle PII according to specific practices. It’s all too easy to make mistakes when working with PII, so we've highlighted six common scenarios to look out for.

The 4 keys to a successful manufacturing IIOT pilot

If you have read our previous post focusing on the challenges of planning, launching and scaling IIOT use cases, you’ve narrowed down the business problems you’re trying to solve, and you have a plan that is both created by the implementation team and supported by executive management. Here’s a plan to make sure you’ve got it all down. Think of these success factors like the legs of a kitchen table and the results that you desire, a bowl of homemade chicken soup.

How to avoid BI vendor lock-in with open architecture

Many organizations have considered or experienced a desire to take advantage of a cheaper platform, more feature rich-software, or to divorce from a vendor who is not delivering. But the pain of moving is simply too great to consider doing it. This is the state of being locked-in. In this blog, we explain what lock-in is, what it means for businesses searching for new embedded analytics solutions, and why it should be a consideration when choosing a platform.