article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. Data lakes continue to swell because each second of every day, every human, on average, is creating 1.7 megabytes of fresh data.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Insiders with privileged access expose companies to the most dangerous cyber threats , and damage the most valuable and sensitive corporate data. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

As highlighted in the 2019 Thales Data Threat Report , an increasing number of organizations across the globe are now using sensitive data on digitally transformative technologies like cloud, virtualization, big data, IoT, blockchain, etc. The Way Forward – Choosing the Correct Approach to Data Encryption.