The amount of data being collected about people, companies, and governments is unprecedented. What can be done with that data is downright frightening. From bedrooms to boardrooms, from Wall Street to Main Street, the ground is shifting in ways that only the most cyber-savvy can anticipate. We reveal the creepy ways to use data now and in the near future.
Each day, 2.5 quintillion bytes of data are created. As more sensors find their way into everything from smartphones to household appliances, cars, and entire cities, it's possible to gain unprecedented insight into the behaviors, motivations, actions, and plans of individuals and organizations.
"Privacy is gone," said Walter O'Brien, founder and CEO of Scorpion Computer Services, the real-life company (with a real live person) upon which the CBS TV series Scorpion is based. "If it's online, it's possible to get at it."
Information is in high demand because it represents power and money. People and organizations are willing pay handsomely for information, whether it's a data feed, a trade secret, IP, credit card numbers, email addresses, passwords, or personal identities. "So much information that consumers deem personal is, in fact, quite readily accessible," said Yoram Golandsky, CEO of cyber-risk consultancy and solution provider CybeRisk Security Solutions, in an interview. "There isn't one repository that can't be broken into. Eventually we find a way in."
Danny Rogers, co-founder and CEO of information security company Terbium Labs estimates that 20% of the US population has been affected by a data breach, based on some rough sampling he did. When searching for a particular compromised email address on the Dark Web, Rogers discovered it had been leaked via 50 different sources.
"It's a massive problem. Personal information is being disseminated far and wide. I don't think people appreciate how far and wide," said Rogers, in an interview. "It's getting to the point where you have to assume your data is not safe with anybody."
While the warnings may sound alarmist or even paranoid, consider the sources: A world-class hacker and security expert, another sought-after security expert, and a Dark Web expert. Happy Halloween, kids. Here are 14 scary examples of what can be done with data.
Lisa Morgan is a freelance writer who covers big data and BI for InformationWeek. She has contributed articles, reports, and other types of content to various publications and sites ranging from SD Times to the Economist Intelligent Unit. Frequent areas of coverage include ... View Full Bio
6 Tools to Protect Big DataMost IT teams have their conventional databases covered in terms of security and business continuity. But as we enter the era of big data, Hadoop, and NoSQL, protection schemes need to evolve. In fact, big data could drive the next big security strategy shift.
Big Data Brings Big Security ProblemsWhy should big data be more difficult to secure? In a word, variety. But the business won’t wait to use it to predict customer behavior, find correlations across disparate data sources, predict fraud or financial risk, and more.
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."