article thumbnail

Putting data storage at the forefront of cloud security

IBM Big Data Hub

Securing sensitive data in an evolving landscape Advancements like those in AI and quantum computing can pose new challenges to customers, especially those in highly regulated industries such as financial services, healthcare, telecommunications and more.

Cloud 87
article thumbnail

RSAC Fireside Chat: The need to stop mobile apps from exposing API keys, user credentials in runtime

The Last Watchdog

Mobile apps work by hooking into dozens of different APIs, and each connection presents a vector for bad actors to get their hands on “API secrets,” i.e. backend data to encryption keys, digital certificates and user credentials that enable them to gain unauthorized control. So be careful out there.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is credential stuffing? And how to prevent it?

Security Affairs

Earmarked by the FBI as a particular threat to the financial service industry just over a year ago, the increase of internet traffic, data breaches and API usage all contribute to the perfect conditions for successful credential stuffing attacks. How to stop credential stuffing attacks. And how to prevent it?

IT 88
article thumbnail

5 things to know: Driving innovation with AI and hybrid cloud in the year ahead

IBM Big Data Hub

For organizations of all types—and especially those in highly regulated industries such as financial services, government, healthcare and telco—considerations including the rise of generative AI, evolving regulations and data sovereignty laws and ongoing security challenges must be top of mind.

Cloud 70
article thumbnail

DEEP TECH NEWS: Respecting individual rights by using ‘privacy preserving aggregate statistics’

The Last Watchdog

To sell us more goods and services, the algorithms of Google, Facebook and Amazon exhaustively parse our digital footprints. Related: The role of ‘attribute based encryption’ There’s nothing intrinsically wrong with companies seeking to better understand their customers. The transformation progresses.

Privacy 218
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

Tune into this webinar to hear from experts from Thales and IDC on how to approach data protection in a cloud computing ecosystem, and the challenges around orchestrating effective security controls in a hybrid cloud environment that depend on proprietary tools and APIs. Security & Compliance for SAP Data in Financial Services.

article thumbnail

5 things to know: IBM Cloud’s mission to accelerate innovation for clients

IBM Big Data Hub

With IBM Cloud for Financial Services , a first-of-its-kind cloud with built-in controls informed by the industry, we are working to help clients on their missions to mitigate this risk, positioning financial services and other regulated industries to host applications and workloads in the cloud in a secured environment.