How emerging tech is rewriting the rules of data security