• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

The Growing Complexity of Data Security: Secrets Management and More

Evan Morris / 5 min read.
December 12, 2022
Datafloq AI Score
×

Datafloq AI Score: 84.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/EW5nn

The term data has gained a much broader connotation in the modern world as organizations strive to achieve full digital transformation and transactions going digital and online. Data is no longer just about statistics, surveys, or information contained in reports and presentations. There are more types of data used nowadays, and many may not be acquainted with them.

As the nature of data changes, so does data security. Securing data in the modern context goes beyond preventing unauthorized access. It is also crucial to ensure that data is not corrupted, encrypted for ransom (in the case of ransomware attacks), or intercepted to be used in other forms of cyber attacks.

Data security is a necessity in the digital economy and in modern life in general. Everyone who uses digital devices and participates in digital transactions deals with some form of data and the need to observe data security practices.

Secrets management: Not as simple as encrypting and decrypting

One example of how complex data security has become is the increasing importance of secret management. Ordinarily, the phrase “secret management” would mean the keeping or handling of personal information that is not supposed to be made public. In the context of cybersecurity, secrets management is a jargon that refers to something similar but more technical.

What is secrets management? Simply put, it is the systematic practice of securely storing and regulating access to sensitive information including passwords, tokens, API keys, certificates, and encryption/decryption keys. It sounds simple and straightforward, but it can actually be quite challenging.

Securing secrets is unlike securing sensitive enterprise files or documents. There is encryption involved, but the access controls are not as simple. Also, the encryption technology used is different from what is often used when storing large amounts of confidential files. It is particularly more complex when it comes to cloud and hybrid setups.

Organizations use diverse kinds of secrets, and managing them is not going to be as easy as using a form or password manager application. In the absence of a sensible secret management solution, some resort to the manual sharing of secrets, which usually leads to the use of weak passwords (so they are easier to memorize or write) and the recycling of passwords across different projects. Some embed the secrets in their code or configuration.

Secrets are also used in app-to-app and app-to-database communications and data access. In many cases, the secrets used here are hard-coded or embedded in devices, which is inadvisable as hackers can easily crack these embedded secrets through scanners, dictionary attacks, or even plain guesswork. It is important to put in place a more secure system of storing and accessing secrets, and this is certainly not going to be as simple as securing a company’s confidential documents.

Moreover, secrets and other sensitive data are employed in the operation of privileged apps and tools, microservices, containers, virtualization and administration consoles, as well as third-party and remote access accounts. Managing and securing sensitive data in these scenarios require sophisticated tools or systems that may not be familiar to many organizations.

Complexity: data security’s enemy

Cloud computing and security expert David Linthicum of InfoWorld shares a sound reminder: complexity is the enemy of cloud security. This actually applies to data security in general. Managing data can be confusing, especially with the kind of IT infrastructure many organizations have and the diversity of IT assets they oversee (or overlook). It’s easy to miss some steps or overlook security best practices, resulting in vulnerabilities and data compromises.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

“Complexity is not new; it’s been creeping up on us for years. More recently, multi-cloud and other complicated, heterogeneous platform deployments have accelerated overly complex deployments….As complexity rises, the risk of breach accelerates at approximately the same rate,” explains Linthicum.

Complexity often aggravates human errors. Security problems emerge because of misconfiguration and other mistakes committed by those who run an organization’s security system. Given how complex IT infrastructure and the extensive variety of the components being managed in an IT ecosystem are at present, it is understandable why there are missteps. However, this should not be an excuse. Complexity is a reality everyone has to deal with, and achieving proper data security means addressing this complexity issue head-on.

To address the complexity issue, it is essential to acknowledge it and include it as one of the factors to consider when formulating data security strategies and looking for data security solutions. Reducing the complexity and implementing an intuitive system for data protection are vital first steps toward dependable data security.

Using the right data security solutions

Generally, real data security cannot be achieved by using a single cybersecurity solution. Again, the data organizations are dealing with now are much broader and more complex. There is no one-size-fits-all solution for it. Different solutions are required to effectively handle different kinds of cyberattacks that target data.

Phishing and social engineering – Addressing data theft attempts through phishing and other social engineering tactics requires more than spam filters and link and email scanners. Effective social engineering defense at present only partly relies on software tools. The core of social engineering defense is the effort to educate people, who are often regarded as the weakest link in the cybersecurity chain, for them to learn how to detect instances of social engineering attacks and respond accordingly

Ransomware, spyware, and other malware – In the case of malicious software that may siphon, corrupt, delete, or encrypt data, the solution involves multiple tools including automated data backup, antivirus, web application firewall, email, and link scanners, and malware detection and prevention systems, among others.

Communication interception tactics – Man-in-the-middle (MIM) attacks or those designed to intercept data exchanged between communicating parties are complex problems that require sophisticated solutions. Two of the best-known solutions are authentication and tamper detection. In authentication, public key infrastructure like Transport Layer Security (TLS) may be employed, wherein clients and servers exchange certificates that indicate secure communications. In tamper detection, there are tools used to examine the latency of responses or discrepancies in response times. MIM attacks are suspected if responses take longer than usual or are not in line with response times patterns established for legitimate connections.

This is not a comprehensive list and discussion of data attacks and their corresponding solutions. However, these should highlight the point that data security is bigger than how most organizations perceive it. As such, multiple tools are needed to attain reassuring data protection.

In conclusion

The data security solution an organization uses should evolve with the threat landscape. It would be inevitable to use multiple tools in the process or transition from one to another. The use of multifunction platforms that integrate various data security solutions is also likely to become commonplace. However, the tools are only a part of the concerns organizations should pay attention to. Foremost, it is essential to properly identify the sensitive data used in an organization and understand the increasing complexity of modern IT infrastructure.

Categories: Big Data
Tags: company, Data, Data security, IT infrastructure
Credit: https://pixabay.com/illustrations/security-castle-secure-internet-1202344/

About Evan Morris

Known for his boundless energy and enthusiasm. Evan works as a Freelance Networking Analyst, an avid blog writer, particularly around technology, cybersecurity and forthcoming threats which can compromise sensitive data. With a vast experience of ethical hacking, Evan's been able to express his views articulately

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!