Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT) devices to virtual repositories in the cloud and back again.
The trend towards greater state surveillance has become even more obvious since Edward Snowden’s revelations. Governments frequently justify such invasions of their citizens’ privacy as counterterrorism
Security investigators believe hackers behind the Yahoo data breach may have exploited a failure to use proper encryption. If this proves true, then many more organizations may be putting customer data at risk.