article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. Data lakes continue to swell because each second of every day, every human, on average, is creating 1.7 megabytes of fresh data.

article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. QKD also seems unsuitable for some of the grand future challenges such as securing the Internet of Things (IoT), big data, social media, or cloud applications.

Big data 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines. In the following, I focus on the analytics component, how it is increasingly used across enterprises, and why it is important to protect big data. Big Data Analytics.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

It foreshadowed how encryption would come to be used as a foundation for Internet commerce – by companies and criminals. Today companies face a challenge of identifying and deflecting encrypted traffic leveraged by malicious actors. In 10 days, the virus infected as many as 10% of internet-connected computers around the globe.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The pursuit of agile software has companies, large and small,at consumed in rapidly developing and tossing into service software meant to function far beyond the perimeters of legacy company networks, in the wide-open Internet cloud. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me.

Big data 240
article thumbnail

Octo Tempest cybercriminal group is "a growing concern"—Microsoft

Malwarebytes

ALPHV was the third most used RaaS between October 2022 - September 2023 ALPHV is a typical RaaS group where several criminal organizations work together to extort victims for data theft and/or encryption of important files. Stop malicious encryption. How to avoid ransomware Block common forms of entry. Prevent intrusions.

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT). The picture looks rather different, when we look at evolving threats in the context of big data. Blockchain.