article thumbnail

Chinese threat actors extract big data and sell it on the dark web

SC Magazine

Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web. The offering was described as big data from an undisclosed mobile operator or operators.

Big data 100
article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Big Data is unstructured.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

The age of Big Data is upon us. And, as more data is available for analytical purposes, more sensitive and private information is at risk. Protecting the confidentiality and integrity and of warehoused data and ensuring that access is controlled is vital to keeping that data secure. respondents.”.

article thumbnail

What is Machine Learning?

Security Boulevard

This big data discipline of artificial intelligence gives systems the freedom to automatically gain information. The post What is Machine Learning? appeared first on Gurucul. The post What is Machine Learning? appeared first on Security Boulevard.

article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture. Perimeter defense, while necessary, is not enough to protect our sensitive data.

article thumbnail

Financial Services Data – More at risk than you’d believe

Thales Cloud Protection & Licensing

With digital transformation technologies like cloud, big data, IoT, containers, mobile payments and blockchain all in play, there are many new attack surfaces and risks to financial data. Each and every environment and instance requires a data security plan and implementation tuned to the environment.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Inconsistent data regulations. Countries have different data security laws, and these can get in the way of one another. Surveillance gives cybercriminals another potential point of entry to see or steal your data.

Internet 223