Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Data Exfiltration Prevention: 5 Best Practices for Modern Security Teams

The security landscape has shifted dramatically. Employees now work across dozens of applications, browsers, and devices—often using personal accounts alongside corporate ones. They're adopting generative AI tools at unprecedented rates, and your source code is moving between repositories faster than traditional DLP tools can detect. This creates a fundamental problem: how do you enable productive work while preventing corporate IP from leaving your trusted environment?

Top 10 Carbon Accounting Platforms Ranked for Data Security and Governance

Carbon accounting software has become essential for organisations facing mandatory emissions reporting. But as sustainability data grows in strategic importance, the security and governance capabilities of these platforms matter as much as their calculation engines. Regulators now treat ESG disclosures with the same scrutiny as financial statements. Investors make decisions worth billions based on sustainability metrics. A data breach, integrity failure, or audit finding in this domain carries consequences that security teams cannot ignore.

Find and Redact Your Data With Protegrity Developer Edition

Dan Johnson, a software engineer at Protegrity, demonstrates how to use the Protegrity Developer Edition to identify and redact Personally Identifiable Information (PII) from unstructured text. Building on our installation guide, we walk through real-world use cases using the Python SDK and Core Edition to transform "useless" raw data into secure, usable information for your AI and ML workflows.

The Rise of DLL Side-Loading Cyber Attacks and Browser Data Theft

Content originally created and published by Venak Security. Cybercriminals are increasingly adopting stealthy and advanced techniques, notably Dynamic-Link Library (DLL) side-loading and browser memory scraping, to install malware that stealthily harvests users’ passwords, credit card data, cookies, session tokens and more. These attacks blend social engineering, search manipulation and memory-level exploitation to bypass traditional defenses and compromise victims at scale.

USB Drive Security Best Practices to Protect Your Data

I’ve seen more data breaches caused by USB drives than you think. Not fancy hacks. Not nation-state attacks. Just people moving files quickly because they had to get something done. A USB drive feels harmless. It’s small, familiar and fast. You plug it in, copy a file, unplug it and move on. That’s exactly why it’s dangerous. USB flash drives and external storage devices carry the most valuable data an individual or organization owns. Contracts. Client records.

New Research Exposes Critical Gap: 64% of Third-Party Applications Access Sensitive Data Without Authorization

Reflectiz today announced the release of its 2026 State of Web Exposure Research, revealing a sharp escalation in clientside risk across global websites, driven primarily by thirdparty applications, marketing tools, and unmanaged digital integrations. According to the new analysis of 4,700 leading websites, 64% of thirdparty applications now access sensitive data without legitimate business justification, up from 51% last year - a 25% yearoveryear spike highlighting a widening governance gap.

Cyberhaven Product Launch: Uniting DSPM & DLP to Secure Data in the AI Era

AI is rewriting data risk. On Feb 3, see how to fight back. Every week, AI makes your team faster—and your data more exposed. Files jump between new tools, models train on sensitive inputs, and traditional DLP is blind to the context that matters most. On February 3 at 11:00 AM PST, we’re pulling back the curtain on Cyberhaven’s unified DSPM & DLP platform—and showing how a single, AI‑native platform can finally keep up with how data actually moves.

Small Devices, Big Risk: USB Drives Threaten Enterprise Security

As cloud applications, SaaS platforms, and GenAI tools shape most modern workflows, one physical channel presents an ongoing risk: removable media. USB drives, external devices, and other portable storage remain some of the easiest ways for sensitive data to leave an organization and some of the quietest ways for threats to enter it.

New Databricks and Snowflake apps strengthen cloud data security and data pipeline visibility

If you’re like most companies we work with, you’re awash in opportunities (and a bit overwhelmed with pressure) to adopt AI. Of course, integrating new technologies means more data to manage and systems to monitor.

Security Embedded In Your Data #Protegrity #datasecurity #cybersecurity #datacentric

Move beyond outdated security models that focus on protecting data infrastructure rather than the data itself. By embedding protection that travels with the data, you create a deterministic environment where data knows its own purpose and enables innovation at scale. Visit Protegrity.com to learn more.