Tag: encryption
Weighing Your Data Security Options for GenAI
No computer can be made completely secure unless it’s buried under six feet of concrete. However, with enough forethought into developing a layered security architecture, data can be secured enough for Fortune 500 ente Read more…
10 Items to Consider for Data Privacy Day
In case your calendar isn’t showing Data Privacy Day occurring this Saturday, January 28, consider this your warning. Acknowledging the importance of data privacy is one thing, but taking the steps to ferret out the po Read more…
The Race to Ensure Post Quantum Data Security
Fault-tolerant quantum computers won’t exist for years – a decade is the most common estimate. When they do arrive, thanks to Shor’s now-famous algorithm, they will be able to crack the most widely-used encryptio Read more…
Mathematica Helps Crack Zodiac Killer’s Code
Cryptographic researchers have finally cracked a 51-year-old code left by the Zodiac, a serial killer who terrorized Northern California in the late 1960s and early 1970s. Much of the work of cracking the code was done i Read more…
Improving Backup Resiliency as the Last Line of Ransomware Defense
In just the first half of 2021, two ransomware attacks had significant impacts on the U.S. and global economies: the attack against Colonial Pipeline limited gasoline availability on the U.S. east coast and drove gas pri Read more…
Comparative Analytics Needs A Secure Approach
Precise comparative data analytics is the proverbial “pot of gold” at the end of the rainbow, but without secure identities, marketers can’t get there. A realm of critical comparative intelligence is lagging in Read more…
Data Privacy in the Crosshairs
2020 was a tumultuous year that saw a surge in Internet use as a result of the COVID-19 pandemic. This proved to be a windfall in some ways, i.e. acceleration of digital transformation. But it also exacerbated some exist Read more…
Security Partnership Combines ML with Net Flow Data
A framework known as network flow is emerging as a cyber-security tool based on the enterprise requirement for broader “network awareness” derived from network flow data. A recent effort with roots in university r Read more…
Get a Grip on Your Data Before GDPR Goes Live
We've been living the Wild West stage of big data the last few years, where data is flying all over the place and basically anything goes. Thanks to a new European law called the General Data Protection Regulation that g Read more…
Tech Startups Wary of Big Data Legal Hassles
At least part of the technological and political blowback from the recent legal battle between the FBI and Apple over government access to encrypted data is a shift among some Silicon Valley startups away from retaining Read more…
Security Concerns Grow As Big Data Moves to Cloud
Despite exponential increases in data storage in the cloud along with databases and the emerging Internet of Things (IoT), IT security executives remain worried about security breaches as well as vulnerabilities introduc Read more…
Crypto Tools Target Hadoop Security Gaps
Growing concerns about the lack of built-in security for open source databases such as Hadoop has created a need for tighter data security as these databases are scaled up to perform big data analytics. A data encrypt Read more…
MongoDB Connects With BI, Visual Tools
MongoDB announced a batch of new business intelligence and data visualizations features along with a new way of linking its database to standard versions of the analytics tools. The new capabilities along with a new d Read more…
Security Concerns Extend to ‘Big Data Life Cycle’
The "datafication" of modern life is now measured in the quintillions of bytes of data generated by humans each day. The struggle to store, manage and retrieve the waterfall of data has also highlighted a growing list of Read more…
Big Data Breach: Security Concerns Still Shadow Hadoop
Halloween has come and gone, but big scares lurk in the forecast for security officers, who should be frightened to the bone about the prospect of their Hadoop clusters getting hacked. Every week seems to bring news o Read more…
Hadoop Security: Still a Lot of Work to Do
Hadoop is quickly gaining momentum as the foundation for a new class of massively parallel applications that works against petabytes of data. But as customers grow their test clusters beyond a handful of nodes, and with Read more…
A Different Einstein on Another Old Problem
A central plot point to the Star Trek: The Next Generation episode, “The Drumhead,” involved a Klingon spy encrypting information biologically so it could be injected into an unwitting passerby and retrieved later. It seemed like a ridiculous technology reserved for the 24th century. Scientists at the Chinese University of Hong Kong figured out how to do just that. Read more…