article thumbnail

Why big data leaders must worry about IoT security

Tech Republic Security

The security risks associated with IoT devices cannot be ignored. If your big data plans include IoT devices, follow these four steps to reduce your chances of a security breach.

Big data 167
article thumbnail

GCHQ on Quantum Key Distribution

Schneier on Security

QKD also seems unsuitable for some of the grand future challenges such as securing the Internet of Things (IoT), big data, social media, or cloud applications. QKD technology cannot replace the flexible authentication mechanisms provided by contemporary public key signatures. I agree with them.

Big data 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data-Centric Security and Big Data

Thales Cloud Protection & Licensing

It’s called the “Zero-Trust Model” and nothing supports it like data-centric security since the methods used can render data useless if it is ever stolen or removed from the enterprise. The Big Data Conundrum. Effective data-centric security solutions are the only reasonable path to realizing a Zero-Trust Model.

article thumbnail

New certification program trains cyber pros in cloud, IoT and other emerging tech

SC Magazine

A visitor looks at an IoT & 5G motherboard at the booth of STMicroelectronics during Electronica China 2021 at Shanghai New International Expo Centre on April 14, 2021 in Shanghai, China. The world of IoT is a vast one to learn for infosec practitioners, but ultimately it comes down to seeing them tiny computers, said Brewer.

IoT 91
article thumbnail

BrandPost: The Future of Machine Learning in Cybersecurity

CSO Magazine

And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity. All data and applications aren’t running on-premises, as hybrid and multicloud are the new normal.

article thumbnail

NEW TECH: Exabeam retools SIEMs; applies credit card fraud detection tactics to network logs

The Last Watchdog

Here are a few takeaways: Very Big Data. Related: Autonomous vehicles are driving IoT security innovation. Fundamentally, SIEMs collect event log data from internet traffic, as well as corporate hardware and software assets. And now, Big Data is about to become Very Big Data. Coming of age.

Big data 157
article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. Cybersecurity vendors competing in this nascent space, Salt Security among them, are ramping up their efforts to leverage Big Data and advanced analytics to meet a highly dynamic and complex security threat.

Big data 240