Remove Authentication Remove Big data Remove Encryption Remove IoT
article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. Data lakes continue to swell because each second of every day, every human, on average, is creating 1.7 megabytes of fresh data.

article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

The UK's GCHQ delivers a brutally blunt assessment of quantum key distribution: QKD protocols address only the problem of agreeing keys for encrypting data. QKD technology cannot replace the flexible authentication mechanisms provided by contemporary public key signatures. I agree with them.

Big data 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines. For years identity management has relied on three factors for authentication: What one knows (passwords). Big Data Analytics. What one has (tokens).

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT). The picture looks rather different, when we look at evolving threats in the context of big data. Blockchain.

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. For example, 37% of the Thales survey respondents are not confident they know where their sensitive data is stored. And only a mere 2.6%

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

IoT Security: Examine the vulnerabilities and challenges associated with securing the Internet of Things (IoT) devices and networks. Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. A startling 95% of API attacks happen on authenticated endpoints. A chilling illustration of how APIs can factor into an attack sequence comes from the massive Capital One data breach. Dearth of planning.

Big data 240