Secure Business Agility

THE AGE OF DATA: THE ERA OF HOMO DIGITUS

The Age of Data

In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and more recently highlighted as a Gigaom conference theme.  In Topol’s vision there is a new human species, Homo digitus that benefits from the data deluge brought about by the convergence of the digital and physical world.  They track sleep quality with brain-wave headbands, monitor vital signs with wrist transceivers and use cell phones for self-diagnosis amongst other things, realizing the opportunity for a much more evolved life.

Data is the New Food

Each evolution of the human species delivers on the promise of a smarter human far more capable than the species that preceded it.  In earlier species humankind looked for new ways to improve hunting and gathering of food and in some parts of the world, such was their mastery that they even created an oversupply of certain foods. Homo Digitus sees data as the new food and you’d be challenged to find any facet of life that has not been revolutionized by data deluge – there are a great many varying estimates, on how much data is created every year but everywhere you look volumes of data are soaring.

Mostly, it’s been for the better good of humankind.  With new data points we’ve experienced great transformation in the quality of services, business process and everyday living.  We’ve come to have a great reliance on the benefits that data deluge brings.  If you consider how often an individual might use map services to estimate a commute, or an app to compare shopping prices, and then for business the productivity and economic gains from using data points to estimate customer preferences, improve customer service and speed business delivery times.

Data Exploitation

Conversely, data is also exploited and misused in ways that leaves humankind fragile and that puts businesses at great risk.  Data breaches, privacy infringements, identity and data theft, and unauthorized data access and changes abound.   Every day we read of some new exploit, more egregious than the previous where criminals have found a new way to extract data and then profit from the sale of that data.

There are also businesses who have started to use data from individuals in a way that is not always very transparent. That’s stating it in very simplistic terms.  However, as great a risk might be posed to businesses from well-intentioned individuals, who might accidentally misuse or overshare data.  It’s only natural considering that for many individuals digitization occurred midway during their lifespan and dealing with the data deluge is not yet a completely natural phenomenon.  Also, our lives are increasingly fast paced, workplaces are more pressurized and the convergence between home and work narrower, that workers are prone to accidentally misusing data.  For example, it’s very easy to accidentally drag and drop a file into an email and send as an attachment.

Controlling the Data Deluge to Maximize on Homo Digitus

What’s needed is a way that allows Homo Digitus to benefit from the positive effects of data deluge but with the safety net that data flows are being directed to only those authorized to have access.  In an enterprise being able to proactively determine data flows and then implement additional safeguards based on a comprehensive set attributes ranging from geolocation, network, device down to multiple facets of identity will be critical, given the sophistication of data exploitation.  Information security tools have traditionally been associated with impeding progress.  Newer solutions need to be easy to implement and policy attributes stated in a way which are business-consumable.   Homo Digitus is still in the process of being shaped.  Now is the time to ensure that data deluge does not become the destroyer of this species and remains the positive enabler.

By Evelyn de Souza

Evelyn de Souza

Evelyn de Souza focuses on developing industry blueprints that accelerate secure cloud adoption for business as well as everyday living. She currently serves as the Chair of the newly formed Cloud Security Alliance (CSA) data governance and privacy working group. Evelyn was named to CloudNOW's Top 10 Women in Cloud Computing for 2014 and SVBJ’s 100 Women of Influence for 2015. Evelyn is the co-creator of Cloud Data Protection Cert, the industry's first blueprint for making data protection "business-consumable” and is currently working on a data protection heatmap that attempts to streamline the data privacy landscape.

What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality? Net neutrality is a concept that has been the centre of a lot of debates recently, ...
The IoT-Connected Car of Today - Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today – Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today Imagine a world where your car not only drives itself, but also says intelligent things ...
Server-less Computing Necessitates A Significant Mind Shift

Server-less Computing Necessitates A Significant Mind Shift

Server-less is More The author of the Pied Piper of Hamelin, Robert Browning, is one of my favorite English poets ...
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Private Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
How Machine Learning Quantifies Trust & Improves Employee Experiences

How Machine Learning Quantifies Trust & Improves Employee Experiences

Machine Learning Quantifies Trust Bottom Line: By enabling enterprises to scale security with user behavior-based, contextual intelligence, Next-Gen Access strategies are ...
Coupa Named a Leader in IDC Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship Management Applications 2018

Coupa Named a Leader in IDC Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship Management Applications 2018

SAN MATEO, Calif., July 09, 2018 (GLOBE NEWSWIRE) -- Coupa (NASDAQ:COUP), a leader in business spend management (BSM), today announced that it has been named a Leader in IDC’s Marketscape Worldwide SaaS and Cloud-Enabled Supplier Relationship ...
Uptick In Cybersecurity Job Searches Confirms Openness To New Employment

Uptick In Cybersecurity Job Searches Confirms Openness To New Employment

Cybersecurity job searches increased nearly six percent between March 2017 and March 2018, according to recently published research by job listings site Indeed. The increase actually outpaced a 3.5 percent uptick in jobs posted. These numbers do not ...
Four Providers of Smart City Kiosks Named IDC Innovators

Four Providers of Smart City Kiosks Named IDC Innovators

FRAMINGHAM, Mass., July 11, 2018 – International Data Corporation (IDC) today published an IDC Innovators report profiling four providers that are considered key emerging vendors in the Smart City kiosks market. The four companies named as ...