Remove 2018 Remove Big data Remove Technology
article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

The age of Big Data is upon us. And, as more data is available for analytical purposes, more sensitive and private information is at risk. Protecting the confidentiality and integrity and of warehoused data and ensuring that access is controlled is vital to keeping that data secure. respondents.”.

article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Security Affairs

Bahrain, 08.04.2019 – Group-IB, an international company that specializes in preventing cyberattacks , and NGN International, a global system integrator, analyzed cybersecurity landscape in Gulf countries in 2018. According to Group-IB’s annual Hi-Tech Crime Trends 2018 report, on average, from June 2017 to August 2018, the details of 1.8

article thumbnail

Why Your Security Data Lake Project Will … Well, Actually …

Anton on Security

Why Your Security Data Lake Project Will … Well, Actually … Long story why but I decided to revisit my 2018 blog titled “Why Your Security Data Lake Project Will FAIL!” However, we are not living in 2012 or 2018 anymore?—?we we are in 2022.

Big data 202
article thumbnail

North Korea-linked Dark Hotel APT leverages CVE-2018-8373 exploit

Security Affairs

The North Korea-linked Dark Hotel APT group is leveraging the recently patched CVE-2018-8373 vulnerability in the VBScript engine in attacks in the wild. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”. Associated homologous 0day attack sample” states Qihoo.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. Consider that 90% of the data that exists in the world was created in two years — 2017 and 2018 — and that our digital universe is on track to swell from 3.2

Big data 153
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

With many employees now working remotely, securing company data isn’t as straightforward as it used to be. As of 2018, more than 2 million people were working abroad for U.S. While she enjoys tackling topics across the technology space, she’s most passionate about educating readers on cybersecurity and Big Data.

Internet 223