News
4/9/2014
12:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Study Reveals 40% of Data Needs Protection; Less than Half of that Gets It

"There is too much information, it's too diverse and too fast."

EMC has released the findings of its 7th annual measurement and analysis of the "digital universe,' defined as all of the digital data created, replicated and consumed each year worldwide.

This year’s findings reveal:

  • 4.4 trillion gigabytes of data created in 2013, less than half the data that needed protection received protection
  • The percentage of data in the digital universe that requires protection is growing exponentially; in 2013, 40% of data required some level of security, compared to 35% in 2012
  • In 2013, less than 20% of the data in the digital universe was either stored or processed by the cloud in some way. By 2020, that percentage will double to 40%.

The digital universe is continually expanding due to phenomena such as the online proliferation of emerging markets and the explosion of the Internet of Things – both of which bring new levels of convenience and efficiency; however, they will also bring forth new ethical questions and inevitable security concerns.

This year’s findings reiterate the need and importance of proper data security. The digital universe is growing exponentially – there is too much information, it’s too diverse and too fast. While this provides great potential for businesses it also comes with great challenges as businesses look to cope with this data deluge to protect themselves and their customers. 

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.