April 10, 2018 | Written by: Marco Brenner
Categorized: Analytics | Automation | GDPR | IBM Research
Share this post:
Within two years, most of today’s cybersecurity technologies will be obsolete.
Since the beginning of 2016, hackers have stolen more than 8 billion records — more than double the two previous years combined — and that doesn’t account for unreported intrusions. The current system of patches, firewalls and blacklists isn’t working. It’s no match for the organized crime rings that carry out more than 80 percent of attacks. These groups systematically probe for weaknesses, share tools and techniques, and continually develop countermeasures for even today’s most advanced security technologies.
The best course of action is to constantly innovate. One method is known as fully homomorphic encryption, which makes it possible to crunch data while its encrypted, meaning the data used never yields any private information. While this could be a great solution, it’s still a few years away from being practical because of processing speed.
Another innovation is called pseudonymization, or if that is a mouthful, desensitized data. The idea is simple, even obvious — transform data so it looks and behaves like the real data, but it’s not.
To read the rest of the story, go to the IBM Consulting Blog.