Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Cisco Data Leak: The Facts on the Ground

On October 14th, prior to the data leak on December 16th, a threat actor known as IntelBroker announced on BreachForums that he was offering a Cisco breach for sale. As is typical for his operations, he provided samples and credited another well-known collaborator, EnergyWeaponUser. The price for the breach was not specified and was to be negotiated privately, with payments accepted exclusively in XMR cryptocurrency.

IP Leak Test Guide: How to Ensure Your Privacy Online for Free

Your IP address is like a digital home address-it tells websites, services, and even hackers where to find you. But what happens if your IP address gets exposed, even when you think it's hidden behind a VPN? This is called an IP leak, and it can compromise your privacy without you even knowing. The good news? You can easily perform an IP leak test to ensure your online activities stay private. And the best part? It doesn't cost a dime. In this guide, we'll walk you through what an IP leak is, how to test for leaks, and how to secure your IP address-all using free tools.

5 Essential Holiday Cybersecurity Tips for Enterprises

While many businesses wind down during the holiday season, cyber criminals ramp up their efforts instead. E-commerce sites are obvious targets, but threat actors target cloud services providers, financial institutions, and social media networks just as often — if not more — during the holidays. Whatever your organization does, you’ll want to follow a few holiday cybersecurity tips to safeguard your sensitive data and protect your staff as the year comes to a close.

Healthcare Data Masking: Tokenization, HIPAA, and More

Healthcare data masking unlocks the incredible potential of healthcare data for analytics and AI applications. The insights from healthcare data can revolutionize the industry from improving patient care to streamlining operations. However, the use of such data is fraught with risk. In the United States, Protected Health Information (PHI) is regulated by the Health Insurance Portability and Accountability Act (HIPAA), which sets stringent requirements to safeguard patient privacy.

Is Your Company's Website Compromising Customer Data?

If you are a security, compliance, and privacy professional, it’s time to focus on an often-ignored issue—client-side security. While many organizations dedicate significant resources to protecting their servers, there’s a critical question to consider: are you also safeguarding what’s happening on your users’ browsers?

Cybercriminals targeting the legal sector

Cybercrime targeting law firms has surged by 77% in the past year, raising significant concerns for the legal sector. The frequency, nature, and motivations of these attacks are evolving, putting law firms in a vulnerable position. Due to the sensitive nature of their data and high stakes, law firms are frequent targets for financially motivated cybercriminals, hacktivists, and even state-sponsored groups.

Don't Choose Between DSPM and DLP: Here's Why You Need Both

As security leaders, you’re tasked with protecting the crown jewels of our organizations, your data, while balancing innovation, compliance, and ever-evolving threats. Yet, too often, data security strategies rely on isolated tools and reactive measures, leaving critical gaps.

Protect Your Data within your Generative AI workflow with Protegrity on AWS Bedrock

Collaboratively authored by Anthony Cammarano, Mario Vargas, Muneeb Hasan, Alexandre Charlet, Andre Castro, Vic Levy, Ken Darker and Iwona Rajca Generative AI (GenAI) applications are revolutionizing how businesses interact with data, primarily through Retrieval-Augmented Generation (RAG) pipelines, combining language models with vast enterprise knowledge bases. These pipelines allow organizations to query extensive internal datasets in real time.

What Is Cloud Encryption? Your Key to Data Security

Imagine your sensitive business data falling into the wrong hands. A data breach can be devastating, leading to financial losses, legal headaches, and irreparable damage to your reputation. Cloud encryption is your key to protecting your valuable data and ensuring peace of mind in the cloud. In this article, we'll explore cloud encryption and how AlgoSec can help you implement it effectively.