Remove Big data Remove Blog Remove Data privacy Remove Risk
article thumbnail

When data privacy and protection are rights, don’t get it wrong

Security Boulevard

Twenty-one years ago, Latanya Sweeney showed that it’s possible to uniquely identify 87% of Americans with just three pieces of personal data: gender, ZIP code and full date of birth. Long before anyone had heard the words ‘data lake’, ‘cloud storage’ or ‘big data’, nevermind ‘social media’, it was clear that the disclosure of even […].

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Big Data is unstructured.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

The Last Watchdog

News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small and large. Related: Europe’s GDPR ushers in new privacy era. Legislation has recently been proposed for individual states, addressing data privacy regulations head-on.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. So, what are some habits you can resolve to adopt this coming year to ensure you and your business are making the most of your data while keeping it secure? What’s in that Big Data Lake?

CISO 72
article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

Gartner defines digital risk management as “the integrated management of risks associated with digital business components, such as cloud, mobile, social, big data, third-party technology providers, OT and the IoT.” Best Practices for Digital Risk Management. Encryption of data at rest and in motion.

Risk 48
article thumbnail

Mastering the German Federal Data Protection Act (BDSG-New): A Deep Dive

Centraleyes

On May 25, 2018, Germany entered a new era of data protection. This marked a significant milestone, shaping global data privacy and setting the stage for enhanced regulations within Germany. But what does this mean for data subjects, and how can they enforce their privacy rights?

article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

DX technologies such as cloud, mobile payments, IoT, Big Data and others have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also in how they communicate with, serve, and support them. For more key findings, download the 2019 Thales Data Threat Report- Retail Edition.

Retail 54