Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

What is Multi-Level Security (MLS) and why is it important?

Implementing the right separation and information protection needed to meet defense and national security requirements is often challenging. As government and defense organisations continue to face increasingly sophisticated threats, cybersecurity must evolve to incorporate new technologies and methodologies where applicable. Dynamic Multi-Level Security (MLS) offers a solution.

Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection

The complex nature of the U.S. CLOUD Act (CLOUD Act) presents far-reaching implications for global data governance. In this article, we explore how this pivotal legislation is reshaping compliance requirements, transforming privacy frameworks and challenging traditional concepts of data sovereignty, as well as strategies and technologies to ensure compliance.

Data Security Monitoring for Jira Admins

Managing Jira Cloud empowers and challenges administrators at the same time. Especially when dealing with critical data security and recovery issues. The complexity of tasks like project migrations, account transitions, or backup restores can often lead to unforeseen data loss or operational disruptions. In this article, you’ll explore how Jira admins can boost data security and prevent pitfalls. Especially while maintaining control over data during backups and migrations.

Now Available: AI-Powered Data Loss Prevention for Microsoft Exchange Online

Organizations investing in Microsoft 365 E5 licensing expect enterprise-grade email protection. Yet despite premium security features, customer feedback reveals persistent challenges with Microsoft Purview DLP across Exchange Online environments. Microsoft deployment specialists report seeing clients deploy Purview on their own, discover a wealth of false positives, and turn off the policies or set them to audit mode. Policies never become useful.

The Missing Layer: Email Protection That Exchange Online and Gmail Users Urgently Need

In our previous blog (Beyond Attachments: How Email Becomes Your Biggest Data Exfiltration Vector), we exposed the critical gaps in standard email data loss prevention (DLP) tools that allow data exfiltration to continue despite significant investment in native controls. Organizations that have implemented targeted solutions to address these gaps report dramatic improvements in their security posture. Here's what comprehensive email DLP actually looks like in practice.

Old Data: Are You Keeping Too Much? Incident Response Risks! #appsec #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Beyond Attachments: How Email Becomes Your Biggest Data Exfiltration Vector

Your Microsoft 365 and Google Workspace security dashboards show green across all metrics. You've implemented data loss prevention policies, enabled advanced threat protection, and your team regularly audits security logs. Yet sensitive data continues to leave your organization through email channels. Why? Because attackers and even non-malicious insiders aren't using the obvious exfiltration techniques your tools were built to detect.

Safeguarding Sensitive Data in the Digital Age: The Evolution of DLP

In today’s interconnected world, data has become the lifeblood of business success, driving innovation, customer engagement, and operational efficiency. As organizations embark on rapid digital transformation, the proliferation of cloud computing and mobile devices, stringent privacy regulations such as GDPR and CCPA, and the rise of disruptive technologies like AI all play a key role in guiding the direction.

Enabling Safe AI Adoption: Insights from Nightfall AI and Vanta

How should data security teams walk the fine line between enabling AI innovation, safeguarding sensitive data, and ensuring compliance? That question drives everything we build at Nightfall. It’s also an excellent jumping off point for an in-depth discussion among security experts.

Cybercriminals Use Telegram Bots to Exfiltrate Data In Phishing Kit Campaign

KnowBe4 ThreatLabs has identified and analyzed a sophisticated cross-platform phishing campaign that utilizes Telegram as its primary exfiltration channel. The campaign uses a combination of security-themed phishing emails, branded phishing websites to harvest credentials, and Telegram bots to exfiltrate data.