News
4/9/2014
12:30 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Study Reveals 40% of Data Needs Protection; Less than Half of that Gets It

"There is too much information, it's too diverse and too fast."

EMC has released the findings of its 7th annual measurement and analysis of the "digital universe,' defined as all of the digital data created, replicated and consumed each year worldwide.

This year’s findings reveal:

  • 4.4 trillion gigabytes of data created in 2013, less than half the data that needed protection received protection
  • The percentage of data in the digital universe that requires protection is growing exponentially; in 2013, 40% of data required some level of security, compared to 35% in 2012
  • In 2013, less than 20% of the data in the digital universe was either stored or processed by the cloud in some way. By 2020, that percentage will double to 40%.

The digital universe is continually expanding due to phenomena such as the online proliferation of emerging markets and the explosion of the Internet of Things – both of which bring new levels of convenience and efficiency; however, they will also bring forth new ethical questions and inevitable security concerns.

This year’s findings reiterate the need and importance of proper data security. The digital universe is growing exponentially – there is too much information, it’s too diverse and too fast. While this provides great potential for businesses it also comes with great challenges as businesses look to cope with this data deluge to protect themselves and their customers. 

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6856
Published: 2014-10-02
The AHRAH (aka com.vet2pet.aid219426) application 219426 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6857
Published: 2014-10-02
The Car Wallpapers HD (aka com.arab4x4.gallery.app) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6858
Published: 2014-10-02
The Mostafa Shemeas (aka com.mostafa.shemeas.website) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6859
Published: 2014-10-02
The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6860
Published: 2014-10-02
The Trial Tracker (aka com.etcweb.android.trial_tracker) application 1.1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.