Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Avoid Hefty Data Protection Fines by Utilizing Next-Gen DSPM Solutions

Whether you follow cybersecurity magazines exclusively or you only consume generic, tech-related content on a regular-basis, you’ve probably heard the news. Tech giants, Tesla and Meta are both in VERY big trouble after violating GDPR and Data Protection standards, causing sensitive data leakage, exposing it to the public.‍

Redefining Personal Data: Understanding the EU General Court's Ruling on Pseudonymized Data

In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them to share data with third parties more easily, as long as it’s appropriately de-identified.

Warning: Sharing Data with ChatGPT Can Be Misused Outside Your Organization

A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls in place to protect who can retrieve it. The frenzy to take advantage of ChatGPT and other AI platforms like it has likely caused some to feed it plenty of corporate data in an effort to have the AI process and provide insightful output based on the queries received.

AI and Deep Learning At Work: How to Know If Your Images Are Storing Sensitive Information

In today’s rapidly digitizing world, the importance of data security has become paramount. With the increasing amount of sensitive information being shared and stored online, securing information from cyber attacks, information breaches, and theft has become a top priority for companies of all sizes. Data loss prevention (DLP) is a critical part of the Netskope Intelligent Security Service Edge (SSE) security platform, providing best-in-class data security to our customers.

The Future of Sustainability Requires Protecting Important Data Everywhere

While it might seem initially abstract, sustainability and data security are symbiotic. Allow me to explain. Regardless of the action or industry, critical data touches everything. Whether data is being used in pharmaceutical research, financial records, or intellectual property, securing it is the common imperative. This is especially true as it moves through various access points, the cloud, applications, the web, and various other transactions.

UK Security Policy Framework and Government Security Classifications Compliance

The UK government’s Security Policy Framework (SPF) outlines the expectations and requirements for security measures to be implemented across UK government departments, and external agencies handling government information and data assets. The framework covers various aspects of information security, including governance, risk management, technology and services, and culture and awareness.

Why Your Business Needs a Data Loss Prevention Strategy

Being a business leader in today’s business environment is no walk in the park. With over 2,200 cybersecurity attacks occurring daily, the task of protecting valuable business data adds an extra layer of complexity to your plate. How do you safeguard your crucial data, ensuring it’s not lost or compromised? You need a comprehensive Data Loss Prevention (DLP) strategy fortified by the best IT security software.

The Ultimate Guide to Classifying Exposed Credentials and Secrets

When looking for programmatic secrets, it’s not easy to figure out what is truly sensitive and how high-risk it is. There are many different types of secrets and credentials, and the context makes a difference. For example, there could be public URLs with tokens in them, public UUIDs, or credentials used in frontend code — these could all be considered API keys or secrets, but not necessarily at the same degree of sensitivity/severity as something like AWS credentials.

5 Guiding Principles to protect your IP effectively with Zero Trust

Zero Trust is the new Buzz word in the cybersecurity arena. Ever since, Forrester Analyst, Kindervag introduced the term Zero Trust in his article “Zero Trust Architecture”, traditional security measures have become obsolete. Zero Trust is a security framework that is based on an “I Trust No One” principle; it doesn’t matter if the user is within or outside the organization. A user is not granted access unless he/she is authenticated and authorized first.