article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

However, when analyzed by new algorithmic data mining methods, big data can reveal patterns, trends, and associations that can, among other things, relate to human behavior and interactions. Industry best practices call for the use of robust encryption solutions to protect sensitive and personal data. Focus on Enhanced Security.

article thumbnail

IoT Unravelled Part 3: Security

Troy Hunt

I've been directly involved in the discovery or disclosure of a heap of these and indeed, security is normally the thing I most commonly write about. Yeah, me either, because most of mine are probably like yours: the simplest electrical devices in the house. The vulnerability is the result of weak encryption used by TP-Link.

IoT 143