Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Maximizing Microsoft Sensitivity Labels in Purview, SharePoint and other Microsoft 365 apps

Data governance and protection are crucial in safeguarding sensitive information. Proper classification and data labeling are essential to ensure that the right people access the right information. Failure to implement these practices can result in data breaches, financial losses, and reputational harm. To help with this, Microsoft offers sensitivity labels that classify and protect data as part of the compliance and security capabilities of Microsoft Purview Information Protection in Microsoft 365.

Enhancing Protection with Data Security Posture Management Tools

In the digital age, businesses face increasing pressures to safeguard their sensitive information. Leveraging effective data security posture management tools is crucial for mitigating risks and enhancing the overall security framework of an organisation.

CMMC and CUI Compliance Glossary: Key Terms and Phrases

Starting November 10, Phase 1 of the US Department of Defense’s CMMC 2.0 program went into effect, marking the start of a phased three-year rollout. Phase 1 begins with Level 1 and 2 self-assessments and culminates with the full implementation of program requirements in Phase 4. Organizations that fail to demonstrate compliance will not be eligible to bid on U.S. Defense contracts.

Shadow AI: From Hidden Threat to Organizational Challenge

This blog post is adapted from a recent episode of The Cloudcast podcast featuring Rohan Sathe, CEO and co-founder of Nightfall AI. Listen to the full conversation here. Your employees are uploading company documents to ChatGPT. Your healthcare teams are transcribing sensitive call recordings and feeding them into LLMs. Your finance department is pasting confidential spreadsheets into publicly accessible AI tools. And unless you have visibility into these workflows, you have no idea it's happening.

Why Removing Document Metadata Matters

Most people consider a document only as words, numbers, and images that are presented on their screen. They think that when they export a file to PDF or attach it to an email, what is visible is all that exists. However, digital documents have a lot more information beneath the surface that are not visible to the casual eye but can be easily accessed by anyone who knows how to find them. The hidden layer of a document is called metadata, and it is much more important in data security than a lot of organizations acknowledging.

SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough Awards Program

SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that its Shopping Cart Inspect (SCI) solutions has been selected as winner of the "Data Leak Detection Solution of the Year" award in the 9th annual CyberSecurity Breakthrough Awards program. Conducted by CyberSecurity Breakthrough, an independent market intelligence organization, the annual program recognizes the most innovative companies, products, and technologies driving progress in the global information security industry.

Comparing NER Models for PII Identification

Identifying and redacting personally identifiable information (PII) is a critical need for enterprises handling sensitive data. Over 1000 NLP models and tools claim to solve this problem, but an infinite number of options opens a paradox of choice. We compiled this comprehensive comparison that examines ten notable PII detection solutions – their features, use cases, pros/cons, and reported success rates.