• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»How emerging tech can protect your customers’ data privacy
Security

How emerging tech can protect your customers’ data privacy

July 8, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How emerging tech can protect your customers' data privacy
Share
Facebook Twitter LinkedIn Pinterest Email

We’re excited to carry Remodel 2022 again in-person July 19 and nearly July 20 – 28. Be a part of AI and information leaders for insightful talks and thrilling networking alternatives. Register as we speak!


Any enterprise that offers with customers will inform you their two largest priorities are buyer expertise and information privateness. The primary one will get prospects within the door, the second retains them there. 

We’ve seen the function digital actuality and synthetic intelligence are taking part in to satisfy customers’ ever-changing calls for for an important expertise. However what concerning the lesser-known applied sciences which are additionally at work to guard our information and identification from safety breaches? 

A research carried out by the Ponemon Institute, sponsored by IBM Safety, revealed the common value of a knowledge breach within the U.S. final yr was a whopping $4.24 million. Safety breaches finally have an effect on the value customers pay for services or products, as companies move on the prices of authorized, regulatory, technical, and different measures. Extra importantly, it might impression prospects’ confidence in your capacity to guard their information in a digital expertise.

I imagine the important thing to profitable and sustaining confidence in your information safety capabilities contains your capacity to safe each information and the functions that course of it from the remainder of your IT infrastructure. That method, even when your community is compromised, your information is just not.

What I’ve described is a cloud-based know-how referred to as ‘confidential computing’ that promotes better privateness safety. Confidential computing permits a company to have full authority and management over its information, even when working in a shared cloud setting. Knowledge is protected and visual solely to its proprietor and nobody else, not even the cloud vendor internet hosting the info – even throughout processing. 

See also  Plant-based chicken startup Rebellyous Foods raises $9.5M to launch latest production tech – Startup

Consider it as a secure deposit field in a resort room. Whenever you keep in a resort, the room is yours, however the resort employees has entry. Due to this fact, it’s a finest follow to maintain your valuables like your passport and cash within the secure deposit field inside the room. Solely you’ve the code to this further layer of safety, despite the fact that the room itself might be accessed. Now think about that the locker doesn’t have a grasp code to interrupt in — that’s how confidential computing might be designed. 

How one can leverage know-how to regulate who has entry to your buyer’s confidential information

1. Securely handle digital property and currencies. Because the adoption of cryptocurrency grows, so does the necessity to safe the know-how it may be accessed by way of. Sustaining buyer belief and privateness on this enviornment stays paramount for the world’s prime banks, exchanges and fintech corporations. Confidential computing performs an important function in serving to these monetary establishments securely handle the rising market demand for digital property. For instance, fintechs can present banks and different monetary establishments digital asset options to handle cryptocurrencies, tokens and bitcoin.

These options can leverage security-critical infrastructure and confidential computing know-how in order that it might assist defend the keys and information related to these digital property, in addition to to course of them with safety protections. Such safety capabilities are designed to mitigate the threat related to malicious actors receiving entry to these property or confidential information related to it.

2. Maintain cash within the financial institution. Banks face an array of digital theft, fraud, and cash laundering threats. All banks are topic to Know Your Buyer, the method that identifies and verifies a shopper’s identification when opening an account. With out exposing personal information, corresponding to your checking account particulars, monetary corporations want an avenue to decide and draw traits and inferences about theft and cash launderers.

See also  Seattle-area startup using AI for mental health screening tech raises $8M – Startup

Confidential computing might be leveraged alongside AI and predictive fashions that assist determine potential fraudsters. Taken collectively, banks might be extra protected when in a position to detect threats whereas permitting the info to stay within the cloud with out threat of being shared with different events.

3. Assist defend affected person privateness. Cellular well being apps and different linked units, together with sensors and wearables, can retailer medical information and allow proactive monitoring of well being information. From a privateness perspective, it will be fascinating to maneuver all affected person information to a central location for evaluation, however the safety dangers of knowledge replication and the complexities of knowledge synchronization can carry further prices and challenges. 

Confidential computing know-how might help deal with these points by way of performing computation in a secured enclave, isolating the info and code to guard towards unauthorized entry. 

As administration of our confidential information turns into more and more distributed — with a lot of it on cellular units and the growing prominence of distant healthcare consultations and digital banking now the norm for customers — it’s crucial to know extra about how the know-how behind the scenes works to higher defend and profit us in our every day actions. 

Nataraj Nagaratnam is the CTO of IBM Cloud Safety.

Source link

customers data emerging privacy protect Tech
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Google Mourns Veteran Engineer Luiz André Barroso Who Invented the Modern Data Center

September 22, 2023

Content creators, this organization aims to advocate & protect your rights

September 8, 2023

She Sacrificed Her Youth to Get the Tech Bros to Grow Up

September 2, 2023

Impact Investors Will Focus More On Emerging Markets

August 31, 2023
Add A Comment

Comments are closed.

Editors Picks

Is Amazon about to acquire EA? Nobody seems to know for certain

August 29, 2022

Stephen King returns in Mr. Harrigan’s Phone

September 16, 2022

New sidescrolling metroidvania with precise movement LUCID announced

September 7, 2022

Amazon expands Prime Video’s Watch Party feature to Roku, smart TVs, and more

July 4, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.