Advertisement

How Encryption Works to Preserve Data Privacy

Cryptography and privacy go hand in hand: Leveraging cryptography to encrypt data for the purposes of preserving privacy isn’t a new concept. In fact, data encryption itself is quite easy. The far greater challenge is data decryption – or, put another way, making sure that encryption doesn’t get in the way of collaboration. After all, data is only […]

Edge Computing: An Overview

Edge computing (EC) allows data generated by the Internet of Things (IoT) to be processed near its source, rather than sending the data great distances, to data centers or a cloud. More specifically, edge computing uses a network of micro-data stations to process or store the data locally, within a range of 100 square feet. […]

‘Tis the Season to Be Wary

‘Tis the season to be jolly. By now, those words from the familiar holiday tune “Deck the Halls” are echoing in malls across the U.S. But the retailers that fill those particular halls with yuletide treasures should be thinking, “‘Tis the season to be wary.” With the holiday shopping season in full swing, December is […]

Overcoming Common Data Privacy and Security Challenges in the Cloud

Click to learn more about author Tejasvi Addagada. A recent survey of C-suite, information technology, and artificial intelligence practitioners offers interesting insights on the enablement of digital capabilities using cloud-based data capabilities. For instance, 68% of IT practitioners said they are using the cloud to store most of their data. Other insights include the planning by the C-level […]

The Fundamentals of Data Anonymization and Protection

Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]