article thumbnail

MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing?

The Last Watchdog

and other jurisdictions have abjectly failed over the past 20 years leveraging Big Data to innovate personalized healthcare services. Healthcare providers haven’t yet figured out how to digitalize medical records in a way that robustly preserves patient privacy and keeps patient information out of data thieves’ hands.

Big data 279
article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

QKD also seems unsuitable for some of the grand future challenges such as securing the Internet of Things (IoT), big data, social media, or cloud applications. QKD technology cannot replace the flexible authentication mechanisms provided by contemporary public key signatures. I agree with them.

Big data 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

Similarly, different nations exercise varying amounts of authority over internet traffic. While most governments won’t likely do anything nefarious with this information, it does heighten the risk of a data breach. Consequently, workers in other countries may have slower internet speeds, which can interfere with security.

Internet 223
article thumbnail

User Privacy: A Top Focus for Xiaomi

TrustArc

Xiaomi Scores Big on User Privacy Protection User privacy has become front and center for organizations across the globe – and for a good reason. More data is being collected than ever before. Trends, such as big data and analytics, and the Internet of Things have accelerated how data is collected, stored, and used.

Big data 122
article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Here are a few takeaways: Very Big Data. Fundamentally, SIEMs collect event log data from internet traffic, as well as corporate hardware and software assets. And now, Big Data is about to become Very Big Data. The earliest SIEMs cropped up around 2005 or so. Coming of age. Talk more soon.

Big data 157
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The pursuit of agile software has companies, large and small,at consumed in rapidly developing and tossing into service software meant to function far beyond the perimeters of legacy company networks, in the wide-open Internet cloud. Salt Security is taking a big data and automation approach to this monumental challenge, Isbitski told me.

Big data 240