Remove 2019 Remove Big data Remove Technology
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

With many of these transformations, it is not just the premise of keeping up that drives the huge levels of investment we see organisations making – but also the promise of what’s possible, if the right technologies and approaches can be harnessed to disrupt or differentiate in the face of fierce competition. Blockchain. Containers.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. Public-interest technology isn't new. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: ‘IOWN’ makes the business case for fostering diversity, respecting individual privacy

The Last Watchdog

Related: Using ‘Big Data’ to improve health and well-being But there’s yet another towering technology mountain to climb: we must also overcome the limitations of Moore’s Law. scientists are working on basic research to develop optical technology that can overcome current challenges.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

It’s 2019 and data is everywhere – and what you can do with what is at your fingertips is truly transformative. What’s in that Big Data Lake? With the uptick in digital transformation that we’re seeing, Big Data is far and wide, bringing genuine security concerns with it.

CISO 72
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Security information and event management, or SIEM, could yet turn out to be the cornerstone technology for securing enterprise networks as digital transformation unfolds. I had the chance to visit with Trevor Daughney, Exabeam’s vice president of product marketing at RSA 2019. Here are a few takeaways: Very Big Data.

Big data 157
article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

We spoke at Black Hat USA 2019. At the same time, digital transformation has redoubled the complexity of company networks, catapulting us from Big Data to Very Big Data. However, for every step forward, in terms of improved sharing, organizations got shoved two steps back by the relentless rising tide of Big Data.

Big data 153
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

These vulnerabilities can span from limited use of data encryption to the abuse of privileged user policies. However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Our 2019 federal report found that 78% of respondents were using sensitive data in a cloud environment.