02.08.2021 Views

Cyber Defense eMagazine August Edition for 2021

Cyber Defense eMagazine August Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

— which include homomorphic encryption, secure multiparty computation, and trusted execution<br />

environments, among others — allow businesses to responsibly monetize existing data assets by<br />

respecting the privacy of both the customers using the monetization service and the data itself. It is critical<br />

that data owners consider both of these components, the data and participants, or the risks associated<br />

with monetization may outweigh the benefits.<br />

At the core of any effective monetization strategy is the holistic security and governance of the data itself.<br />

Some organizations are working to address this issue by adopting a data-centric approach to security,<br />

focusing on the security of the data rather than just the networks, servers, and applications it resides on.<br />

The goal of this holistic approach is to protect data wherever it is within an organization, whether at rest<br />

on the file system, moving through the network, or while it’s actually being used or processed, as<br />

represented in the Data Security Triad. If there is data of value at stake, it must be protected at all times.<br />

While Data at Rest and Data in Transit are commonly protected using standard data and transport<br />

encryption, the Data in Use segment is frequently overlooked by many organizations. Protecting data<br />

while it's being used is especially of critical importance when it comes to leveraging data <strong>for</strong> monetization<br />

purposes. PETs solutions are uniquely positioned to address these Data in Use vulnerabilities because<br />

they can allow sensitive or regulated data to be securely processed and in a privacy-preserving manner<br />

without the risk of exposure. With PETs, organizations can analyze, use, and provide access to data<br />

assets in ways that may have previously been determined to be too risky, especially if that data is to be<br />

shared with a third party.<br />

PETs can also serve to protect the users of data monetization plat<strong>for</strong>ms by protecting their interests and<br />

intents. For competitive reasons, organizations generally want to avoid revealing their specific interests<br />

in a third-party dataset, even to the data owner. PETs allow these users to per<strong>for</strong>m encrypted queries<br />

and analysis, ensuring the content of their interaction with the data is never exposed beyond their walls.<br />

For data owners, this expands the range of potential targets and ensures that users never introduce<br />

sensitive or regulated content, such as those they may be included in the query itself, into their<br />

environment.<br />

Another significant barrier to monetizing existing data assets has been the need to combine or move data<br />

assets to a central or even third-party location. There are a number of issues with such an approach, only<br />

some of which involve data privacy. But homomorphic encryption, a pillar of the PETs category, can<br />

overcome this challenge by enabling a decentralized framework <strong>for</strong> secure data sharing and<br />

monetization. When designed to work as a proxy layer, the technology can also allow organizations to<br />

integrate with existing data governance mechanisms such as access control measures and audit<br />

systems. This ability to control and audit data usage and access is key to any monetization initiative.<br />

There is no question that there are new revenue opportunities waiting to be unlocked by securely and<br />

privately leveraging existing data assets in a privacy-preserving manner. However, while pursuing<br />

technical answers to the question of "Can we?" organizations must also consider the foundational<br />

question of "Should we?" be<strong>for</strong>e they embark. Data monetization is a cross-functional undertaking and it<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2021</strong> <strong>Edition</strong> 72<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!