top of page

The Burk Blog


Michael Trotter-Lawson
Apr 4, 20242 min read
Top 5 Threats IoT Devices Pose to Data Protection & Privacy
Learn about the common IoT vulnerabilities and the top five threats you need to keep an eye out for.
2
0


Michael Trotter-Lawson
Mar 21, 20243 min read
The Hidden Costs of Ineffective Data Management
Let's look at the consequences of improper data management and discuss how businesses like yours can effectively deal with these challenges.
1
0


Michael Trotter-Lawson
Mar 7, 20242 min read
A Deep Dive Into Data Governance
It’s crucial to know the difference between data management and data governance to get the most out of your data.
1
0


Ben Lawson
Aug 10, 202213 min read
The Data Centric Security Model
There is no debate regarding the purpose of Information Services security. IS Security exists to safeguard data.
0
0
bottom of page