article thumbnail

Why big data leaders must worry about IoT security

Tech Republic Security

The security risks associated with IoT devices cannot be ignored. If your big data plans include IoT devices, follow these four steps to reduce your chances of a security breach.

Big data 163
article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

It’s called the “Zero-Trust Model” and nothing supports it like data-centric security since the methods used can render data useless if it is ever stolen or removed from the enterprise. The Big Data Conundrum. Effective data-centric security solutions are the only reasonable path to realizing a Zero-Trust Model.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New certification program trains cyber pros in cloud, IoT and other emerging tech

SC Magazine

A visitor looks at an IoT & 5G motherboard at the booth of STMicroelectronics during Electronica China 2021 at Shanghai New International Expo Centre on April 14, 2021 in Shanghai, China. The world of IoT is a vast one to learn for infosec practitioners, but ultimately it comes down to seeing them tiny computers, said Brewer.

IoT 91
article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines. In the following, I focus on the analytics component, how it is increasingly used across enterprises, and why it is important to protect big data. Big Data Analytics.

article thumbnail

BrandPost: The Future of Machine Learning in Cybersecurity

CSO Magazine

And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. All data and applications aren’t running on-premises, as hybrid and multicloud are the new normal.

article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

QKD also seems unsuitable for some of the grand future challenges such as securing the Internet of Things (IoT), big data, social media, or cloud applications. QKD technology cannot replace the flexible authentication mechanisms provided by contemporary public key signatures. I agree with them.

Big data 194
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT). The picture looks rather different, when we look at evolving threats in the context of big data. Blockchain.