GDPR

GDPR & Protecting Data Privacy with Cryptographic Pseudonyms

Share this post:

Within two years, most of today’s cybersecurity technologies will be obsolete.

Since the beginning of 2016, hackers have stolen more than 8 billion records — more than double the two previous years combined — and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for the organized crime rings that carry out more than 80 percent of attacks. These groups systematically probe for weaknesses, share tools and techniques, and continually develop countermeasures for even today’s most advanced security technologies.

The best course of action is to constantly innovate. One method is known as fully homomorphic encryption, which makes it possible to crunch data while its encrypted, meaning the data used never yields any private information. While this could be a great solution, it’s still a few years away from being practical because of processing speed.

Another innovation is called pseudonymization, or if that is a mouthful, desensitized data. The idea is simple, even obvious — transform data so it looks and behaves like the real data, but it’s not.

To read the rest of the story, go to the IBM Consulting Blog.

Associate Partner, IBM Services

More GDPR stories

How Russia Got a Flavor for Advanced Analytics

The 2016 C-suite study by the IBM Institute of Business Value has shown that the top managers from Russia and the countries of the Commonwealth of Independent States (CIS) put the macroeconomic factors as the main external force affecting their companies. Whereas, globally the respondents put the technology and the market factors way ahead of […]

Continue reading

All-Flash Solutions are Redefining Storage in a Multi-Cloud World

Companies across every industry are shifting to a multi-cloud environment in order to move faster than their competitors, enhance modern data protection, deliver better customer experiences and drive growth. As they make this essential transition, key trends such as artificial intelligence (AI), containers, and Non-Volatile Memory Express (NVMe) are redefining enterprise data storage in the […]

Continue reading

Cancer as an Information Science Challenge, and Manageable Condition

As a former trauma coordinator for Children’s Hospital of Pittsburgh, I know what it’s like to be on the front lines of patient care. It was perhaps most personal when my cousin was diagnosed with bone cancer. As a patient in the hospital in which I worked, I watched as doctors tried everything they knew […]

Continue reading