article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google. But it’s coming, in the form of driverless cars, climate-restoring infrastructure and next-gen healthcare technology.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Insiders with privileged access expose companies to the most dangerous cyber threats , and damage the most valuable and sensitive corporate data. Regularly revisit the rights of business users, including executive officials, finance, HR, Legal, and IT departments, and make sure you are able to change and revoke them.