Intelligent Data Centres Issue 75 | Page 43

WITH DATA-IN-USE ENCRYPTION, USERS DON’ T HAVE TO SURRENDER THEIR ENCRYPTION KEYS AND IF A DATA LEAK OCCURS, THE ENCRYPTION RENDERS IT UNUSABLE TO THREAT ACTORS.
E X P E R T O P I N I O N ncryption has a

E fascinating history that spans thousands of years, but it has become deeply ingrained into our business psyche with the development of public-key cryptography in the 1970s, which revolutionised digital security.

Since then, it has evolved from simple substitution ciphers to complex algorithms that protect our daily digital lives. In fact, the data encryption market size is projected to grow from US $ 14.5 billion in 2024 to US $ 40.2 billion by 2032.
However, because of its longevity and rich heritage, there are plenty of misconceptions about encryption. In this article, I’ ll debunk some of the most common myths and explore how Next- Gen Fully Homomorphic Encryption( FHE) works differently – and why it’ s critically important.
Every enterprise is built on data. The pillars of modern data strategies include integration and accessibility, quality and compliance and strategic data governance. Enabling data unlocks the door to growth, innovation and a competitive advantage. However, most
Myth 2 – Encrypted data is 100 % safe
Encryption is a critical layer of security, but it ' s by no means a silver bullet. Data can still be vulnerable to breaches, human error, phishing attacks, identity theft or software vulnerabilities. Therefore, in an increasingly sophisticated cyberthreat landscape, enterprises must assume that cyberbreaches are inevitable.
This means security and IT controls must be highly preventative, securely

WITH DATA-IN-USE ENCRYPTION, USERS DON’ T HAVE TO SURRENDER THEIR ENCRYPTION KEYS AND IF A DATA LEAK OCCURS, THE ENCRYPTION RENDERS IT UNUSABLE TO THREAT ACTORS.
organisations are forced to work with limited data access; the data they can utilise is often encrypted and must be decrypted before it can be used.
Myth 1 – Encryption is unbreakable
While strong encryption is difficult to break, it is by no means impossible. Vulnerabilities in implementation, weak passwords, or advances in computing power( such as quantum computing) can – and will – compromise encrypted data.
Without a doubt, modern data encryption has evolved. Organisations can encrypt data, both at-rest and when in-transit as data is moved around. However, herein lies the problem: data must be decrypted when it needs to be used.
Decryption puts data at risk and makes it vulnerable to attack, compromise or misuse. Malicious actors don’ t need to try and break encryption; they just have to wait for organisations to use it – when it has been decrypted. locking data down. Legal, privacy and compliance controls should be equally punitive to deter organisations from falling out of compliance. Enterprises are afraid they will lose control of their data and with increasing regulation and compliance requirements, they need to demonstrate their data is under control.
These two issues combined make it incredibly difficult for businesses to use secured data. Therefore, while the data might be safe, it is unusable because it is hard to access.
Myth 3 – Only cybercriminals use encryption
Criminals use encrypted messaging platforms like Telegram or Signal to plan and coordinate illegal activities, making it difficult for law enforcement bodies to intercept their communications. They also use encryption to encrypt victims ' data and demand payment for the encryption keys. Encryption is also used to disguise malicious software( malware)
www. intelligentdatacentres. com 43