Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

A Modern DLP Solution Has These Non-Negotiable Characteristics

Security professionals were once confident that the valuable data they protected was safely tucked away inside heavily fortified data centers. But as businesses of all sizes undergo digital transformation, moving their data to the cloud and across numerous distributed locations, the demands placed on legacy data protection systems have changed drastically.

Introducing Nightfall AI for Zendesk | AI-Powered Cloud Data Leak Prevention (DLP)

Nightfall is the first AI-powered data leak prevention (DLP) solution for Zendesk. Discover sensitive data in support tickets and files. Automatically find and remove PII, PCI, and API keys, reducing the risk of breach and simplifying compliance.

How to Protect Customer Data in Zendesk - Part 3: Using Nightfall to protect critical stakeholder data

Nightfall’s Cloud DLP platform helps you limit access to sensitive data, by protecting the data where it is stored. With Nightfall you can redact, delete attachments, or make the data private in one click or via automated actions.

Coast Capital Savings Credit Union: Meeting Canadian Regulatory Standards for Compliance with Protegrity

One of Canada’s largest credit unions, Coast Capital Savings Credit Union (CSS), with over 50 branches across the country, needed to protect critical PII data stored in their AWS cloud environments, Amazon Redshift, AWS EMR, and AWS S3. CSS had to meet Canadian regulatory standards for compliance in 2021, including the Personal Information Electronic Documents Act (PIPEDA), along with a data transformation initiative surrounding its architecture.

How to Protect Customer Data in Zendesk - Part 2: Addressing Sensitive Data Growth

The proliferation of sensitive data continues to grow unabated, particularly for support agents using Zendesk. The Zendesk’s CX Trends 2022 Report found that ticket volume had increased across all channels, with webform/email up 10% YoY and chat up 17% YoY.

DevSecOps for OpenAI: detecting sensitive data shared with generative AIs

It is clear a new technology is taking hold when it becomes impossible to avoid hearing about it. That’s the case with generative AI. Large language models (LLMs) like OpenAI’s GPT-4 and the more approachable ChatGPT are making waves the world over. Generative AI is exciting, and it’s causing a real fear of missing out for tech companies as they try to match competitors.

Protecting Intellectual Property (IP) in the Supply Chain

Data security policies are most often targeted around insider threats and external attackers, but your distributors can equally put intellectual property (IP) protection and other sensitive data at risk. IP is arguably a business’s most valuable asset and can take the form of product designs, software code, media content, etc. Protecting your IP is important because it allows your business to maintain a competitive edge in the market and generate revenue from your innovation.

Privacy is Power: The Value of Training for Modern Data Protection

We’ve all seen it in the movies: The chief of security declares that no one could ever steal the “Famous Jewel” because it’s protected by thick glass, an impenetrable system of motion-detecting lasers, and, finally, a weight-sensitive sensor. Cut to the next scene, where a thief, dressed in sleek black, zip-lines from an open skylight, shorts the lasers, scores the glass, and with split-second timing, swaps the jewel for a replica of equal weight.

Enabling Zero Trust Data Security through Security Awareness Education

In today's interconnected world, modern organizations face an ever-increasing array of cybersecurity threats. One of the most effective ways to protect sensitive data and ensure zero trust data security is by fostering a strong culture of security awareness among employees.