article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

A new form of agile cryptography must get established in order to robustly preserve privacy and security as all this raw data gets put to commercial use. The NIST standards serve as a roadmap showing how to more granularly manage access rights for people and systems without unduly burdening users or system administrators.

article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

With this seamless interaction of the latest IoT technologies, “smart cities” are redefining the way we live and work. There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns. This scenario seems smart, but is it secure? The cost of a security failure.

Security 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Security 223
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Longtime network and system administrator Jack Daniel is a technology community activist, mentor, and storyteller.

article thumbnail

The Hacker Mind Podcast: Ethical Hacking

ForAllSecure

Because as we become more dependent on technology and security, I'm sorry, more dependent on technology, security, and privacy is gonna become more important in our lives. Now you've got in addition to all the other things that have evolved and as quickly as they have evolved, you've now got cloud and IoT. on society.

IT 52