Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

How to Secure Sensitive Data in Jira & Confluence with DLP (Data loss prevention)

In almost every major enterprise, Jira and Confluence are the default operating systems for innovation. They hold your organization's most vital intelligence, from product roadmaps to financial planning. Yet, while companies invest billions in fortress-like perimeter security, firewalls and VPNs, to keep external attackers out, they often ignore the fragility of their internal collaboration environments.

Beyond Pattern Matching: How AI-Native File Classification Solves Modern DLP Challenges

Legacy DLP operates on a fundamental constraint: it identifies sensitive data by matching patterns. Credit card numbers follow the Luhn algorithm. Social Security numbers conform to a nine-digit format. API keys match specific string patterns. This approach works for structured data, but it fails to address a critical reality: Your most sensitive assets aren't numbers. They're documents.

Welcome to the Protegrity Developer Edition Set-up Series

Stop struggling with complex security setups and get straight to building with the Protegrity Developer Edition. Our demo series, hosted by Dan Johnson, shows you how to deploy a full, self-contained data protection environment on your local machine in under 15 minutes using GitHub and Docker. You will learn to master everything from PII discovery and automated redaction to advanced encryption and semantic guardrails for AI workflows.

What Snowstorms Can Teach Us About Contextual Access and Data Interoperability

As Winter Storm Fern made its way across the US this weekend, children across the country were glued to phones, computers, or televisions as they tried to guess how long they would be out of school this week. Little do they know, however, the data, science, and lack thereof, that goes into that decision. School closures are the very public end of a complex and fast-changing dataset that is highly dependent on locality and can be wildly different on either side of a district line.

MCP & AI Agent Security: Addressing the Growing Data Exfiltration Vector

The security landscape is shifting. For the past two years, security teams have focused primarily on what users type into chatbots by monitoring interactions with ChatGPT, Gemini, and Claude. But a new risk vector is emerging, one that operates largely outside traditional security controls: AI agents accessing corporate data autonomously through the Model Context Protocol (MCP).

Nightfall DLP 2026: Corporate v. Personal Session Differentiation | Live Demo

See the future of data loss prevention in action. This live demo showcases Nightfall's breakthrough session differentiation technology that intelligently blocks sensitive file uploads to personal cloud accounts while seamlessly allowing them in corporate environments.

Semantic Guardrails for AI/ML - Protegrity AI Developer Edition

In this installment of our AI Developer Edition Set-up series, Dan Johnson, a software engineer at Protegrity, introduces semantic guardrails. Learn how to protect your LLM and chatbot workflows from malicious prompts and insecure AI responses. As AI becomes central to enterprise operations, controlling the context of conversations is a major challenge. Semantic guardrails provide a safety layer that ensures your AI stays on topic and never leaks sensitive PII.

AI-Powered Data Detection That Actually Works: 95% Precision, Zero Regex | Nightfall Product Launch

Tired of drowning in false positives? See how Nightfall's AI-powered detection achieves human-level accuracy and makes DLP automation possible. See three breakthrough capabilities from Nightfall: Prompt-based entity detectors - Protect custom IDs with natural language (no regex!) 23+ AI file classifiers - Detect source code, HR files, customer lists automatically Custom classifiers - Build your own in minutes with one sample file.
Featured Post

Passwords a necessary evil: Are we ready for a passwordless world?

For decades, passwords have been the gatekeepers of our digital lives. From logging into emails and banking apps to accessing social media and workplace systems, passwords have been the standard tool for authentication. Yet, as cyberattacks grow in sophistication and frequency, and as users juggle dozens of complex logins, it's clear that passwords are not only inconvenient, but they are increasingly insecure.

Coinbase's $400 Million Wake-Up Call: Why DLP Must Monitor Behavior, Not Just Content

In May 2025, Coinbase disclosed a data breach that exposed nearly 70,000 customer records—not through a sophisticated external attack, but through bribed customer service agents. The cryptocurrency exchange refused a $20 million ransom demand and instead pledged that amount toward catching those responsible. One arrest has been made in India, but the incident highlights a fundamental problem in modern security: your people can become your greatest vulnerability.