Yatta! partnered writers have published hundreds of items across many websites. The items below are a small sample of our team’s work. All of these blog entries are excerpts of larger pieces by one of our partnered writers – please click the link at the bottom of each piece to read the full content.

FISMA Overview and Application
FISMA Overview and Application
Working with governmental assets is perhaps the most rewarding and the most challenging of data situations. While these contracts give a sense of purpose and are often quite lucrative, they
Read more →
EU GDPR and the Right to Erasure
EU GDPR and the Right to Erasure
The European Union is a huge market for any online data providers and managers – the market itself is giant, and to many, represents a market with evolving value. Unfortunately,
Read more →
Securing Remotely Duplicated Content
Securing Remotely Duplicated Content
Data management is fundamentally a fight between business need with security. In a perfect world with no need for data security, data would be duplicated across multiple machines, accessible to
Read more →
Wiping Data and its Forensic Trail
Wiping Data and its Forensic Trail
In the modern security climate, securing data is of vital importance — key corporate data such as client lists, development roadmaps, and even employee data are constant targets of espionage,
Read more →
Standard API Definitions Demystified
Standard API Definitions Demystified
As with any industry, the web API space faces different approaches to standardization. Not least of which are the differences between how API providers choose to definetheir APIs in a machine
Read more →
The Myth of “Perfect Security”
The Myth of “Perfect Security”
I’m somewhat obsessed with security – in fact, despite working in content management by day and writing on the API industry by night, network and data security was and continues to be
Read more →