Remove Big data Remove Encryption Remove Security Remove Systems administration
article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

In order to get there, one big technical hurdle must be surmounted. A new form of agile cryptography must get established in order to robustly preserve privacy and security as all this raw data gets put to commercial use. Data lakes continue to swell because each second of every day, every human, on average, is creating 1.7

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

As highlighted in the 2019 Thales Data Threat Report , an increasing number of organizations across the globe are now using sensitive data on digitally transformative technologies like cloud, virtualization, big data, IoT, blockchain, etc. The Way Forward – Choosing the Correct Approach to Data Encryption.