‘Information Management Blog’

The fight against fraud is more like a race – a long, never-ending ultra marathon where your opponents are always 100 yards ahead of you.  If you don’t keep pace, your profit margins are impacted, you put customers at risk, and the government eventually steps in and shuts you down. If you sprint too hard, […]

Build a firm foundation for link analysis by correctly structuring and importing entities into IBM i2 Analyst’s Notebook.  Click Here to download Quinn’s data set (if you want to play along/replicate the demo).  

Genius is eternal patience – Michelangelo (and every hacker worth his salt) Let’s get your Security Operations Center (SOC) focused on catching the “low and slow” threats that fly under your radar.  They’ve likely had access to your infrastructure for months. Wanna smoke ’em out?  Give Alpine a call!

Let’s face it: data quality is important, but how do you know if it is causing your business problems? There are some very technical definitions of data quality, but let’s stick to some simple questions you can ask yourself: Are the data accessible? Can you easily land on a specific piece of information, such as […]

In the mid to late 2000’s, anti money laundering (AML) efforts were focused on illicit drugs and identifying those responsible for distributing those drugs. The investigations involved chasing the money and seizing the assets which would presumably halt the distribution network. Fast forward to 2010:  drugs were certainly significant in the movement and laundering of […]