Welcome to our fully functional beta site. We welcome all comments
The Informatica blog - Authored by Claudiu Popa

(Why You Should Develop) A Passion for (Protecting) the Intangible

People often confuse information protection with IT security. One of the reasons I resist the compartmentalization of my craft as an automated, software driven process is that as important as it is, IT security not only reduces the scope of my work by at least two-thirds, but it misses the point of what it means to truly enable protection for the intangible. The important task of protecting information absolutely depends on people who are interested, educated and dare I say it, passionate. Security doesn't work without a high level of consistent human engagement. Privacy fails without passion and respect. In fact, no modern, human activity functions effectively without a high degree of emotional investment.

A Passion for InformationWhy is this? Why can’t we systematize everything and build an app for it? Because we are dealing with a substance free from physical properties. Information is intangible, tasteless, colorless and for the most part, odorless. It is perhaps the most impactful of substances, driving world economies and impacting everyone on the planet on a very individual level. And so, our relationship with information is very personal and delicate. Although it doesn’t impact our senses the way a piece of cheese or silly putty do, it can assault our being and drive our existence in powerful ways. And yet, we cannot touch it.

The beauty of informationWe can contain it, constrain it, shape it and share it. We can use it to sculpt truly divine creations or to cause catastrophic destruction. And so it scales. It touches us at a molecular and emotional level. It affects our organizations and economies on a gigantic scale. It generously allows us to tame it, selflessly allowing us to claim credit for its infinitely beautiful uses and reap the profits of using it to our benefit. If I always describe it in almost anthropomorphic terms, it’s because it has almost angelic properties. It is better than us. It is deeply rooted in data. It is precise, articulate and discretely connected.

Information is a reflection of us. It can be kind or harsh, specific or vague, concise or verbose, trivial or meaningful, ugly or beautiful. But it is always genuine and for that reason, we instinctively care for it in a different way than we care for its raw materials: data. Without realizing it, much of what we do on a daily basis is a quest for developing new ways to embrace information, to nurture it, repurpose or abuse it.

Information is beautifulWe imagine, then invent exciting mechanisms, processes, apps or gizmos just so we can drop data into them and with a child’s wide eyed anticipation, observe as these are transformed into meaning. Is that not the very essence of power? Information is malleable and compliant, allowing us to adapt systems that exploit its wonderful promises and unlock its enormous potential. But it is only on a personal or social level that we can truly understand it, relate to it and yes, protect it.
So if you argue that information is a commodity, I will cautiously agree. But the ways we share the world with this entity are anything but trivial. Data are, and is, eternal. It’s out there, everywhere, independent of us. Information however is elusive, special and transient. Information appears when we pay attention. It is the exquisite nectar derived from training our wits on collecting and interpreting instantiations of this ambient element. And the resulting elixir has spurred humanity’s progress since the beginning of time. This quest for cumulative knowledge separates us from most other living things. Every innovation you hear about on a daily basis has to do with improving on the use of data for artistic, scientific and economic purposes. Exceptional computing mines, distils and purifies quality data. Exceptional people thrive on information. Information is data with purpose, scope and dimension. Data scientists are the artists and alchemists of our time. And so, our achievement is the product of two entities: people and information. Do we love it? You bet. Are we responsible for protecting it? Absolutely. Can we entirely delegate? Never. And that’s the beauty of this symbiotic relationship.
Some (more) delectable evidence:

Google's Data Centres: Click through to PetaPixel:
Google's data centres contain yummy information
Finally, you can't be a true information junkie without marveling illustrated logarithmic timelines, in particular those meticulously "arranged" by one John B. Sparks, dating back to 1932. These fascinating early infographics used to sell for just $1. But don't let me spoil your fun. You and Google can look up Histomaps right here.
Histomap of evolution
And purely for context, a more recent but less complete artistic rendition (this is the Geologic Time Spiral):

 Geological time scale


Claudiu Popa is trusted by remarkable organizations and exceptional leaders. He is a Risk Advisor, providing decision support on matters of information security, privacy, compliance and other critical operational aspects of enterprise information management. He makes executives feel like superheroes and creates memorable experiences for staff members.

Everything Claudiu does is intimately related to information. He is the President and CEO of Informatica Corporation (SecurityandPrivacy.ca) and founder of KnowledgeFlow.ca. He has authored The Canadian Privacy and Data Security Toolkit (CICA, 2009) and Managing Personal Information (Reuters, 2012, PrivacyRisk.ca). Email Claudiu@RiskAdvisor.ca, follow Claudiu on Twitter @infosuperjunkie or connect on Facebook.ClaudiuPopa.com

In the early 1920s, the Enigma machine was a portable encryption machine with rotor scramblers used for encoding and decoding confidential messages....
Bleeding hearts unite, the OpenSSL Heartbleed bug threatens to impact user privacy and business security online. There's a new security vulnerability in town. It's not even that new, we just didn't know about it until now. But it's a whopper and it threatens to i...
Independent risk assessments are the most basic best practice in business.Security is about risk. And risk is about numbers. Given the high probability of suffering data security and privacy breaches, is it any wonder compan...
Netflix just the latest brand used in wave of phone text support fraudEver wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potent...
Layered SecurityI'm often surprised at the public's disappointment with the realization that security processes are not directly analogous to the medical notion of im...
Target breach will have serious consequencesThis past Christmas season hasn't been kind to the Target chain of retail stores nor to its brand. A brazen attack took place in December that affecte...

Welcome to Informatica

Be Secure.

Be Trusted.

Follow us on