Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Data Lineage and Why Does it Matter in Data Loss Prevention?

In today's data-driven world, organizations handle vast amounts of sensitive information, ranging from personally identifiable information (PII) to protected health information (PHI) and payment card industry (PCI) data. Ensuring the security and compliance of this data is not only a legal requirement but also essential for maintaining customer trust and protecting the organization's reputation.

Here's What We Can Learn from the Cyberhaven Incident

In December 2024, Cyberhaven fell victim to a sophisticated cyberattack that exploited a phishing campaign targeting its Chrome Web Store account. This breach compromised over 400,000 users by injecting malicious code into its browser extension, exfiltrating sensitive data such as cookies and session tokens. The incident has drawn significant attention due to Cyberhaven's role as a cybersecurity provider and the broader implications for browser extension security.

The 12 Best Data Loss Prevention Software Solutions of 2025 and 50+ FAQs Answered

Data breaches cost companies an average of more than $4 million per incident—and that’s before considering the reputational fallout. Data Loss Prevention (DLP) tools have become indispensable for safeguarding sensitive data, especially as organizations embrace hybrid, remote, and cloud-first operations. Once limited to rules-based data classification, modern DLP has evolved into a powerful fusion of AI-driven classification and AI-based data lineage.

The 7 Most Telling Data Breaches of 2024

While cyber criminals continue to devise ever more creative ways to get into systems, the outcomes of repeat like a broken record: stolen data and lost money. It happened in again and again this year, but our pick proves the stakes are only getting higher with time. We'll explain the logic behind the list, impacts felt, and key takeaways.

People Problem or Data Problem? Risks and Mitigation of Insider Threats

An insider is any person with authorized access to systems or data that gives them the ability to take potentially harmful actions. Insiders range from business partners or third party contractors to full- and part-time employees–essentially all valid users with access to resources that you'd rather keep out of the wrong hands. People are just people, but when they mishandle data, they fall into the category of being an insider threat–intentional or not.

Loose AWS API keys: what's your real risk?

97% of enterprise leaders consider a well-executed API strategy critical in driving their organization's growth and protecting revenue streams, yet according to a recent study, 84% of security professionals reported API security incidents over the past year. In March, a GitHub breach exposed nearly 13 million API secrets that users had left in the repository over time, severely impacting customer trust and causing reputational damage.

Intelligent Data Classification: Transforming Google Drive Security

Our customers often tell us about how they implement manual classification policies. However, with several hundreds of files created daily, and constant sharing between teams, it becomes impossible to enforce secure sharing and sensitive data protection. Imagine that your sales team just accidentally shared a spreadsheet containing customer credit card details with an external vendor. Or perhaps your HR department stored employee health records in a folder that wasn't properly restricted.

How To Prevent Secrets Sprawl

Where are your credentials and secrets, and how are you protecting them? These are fair questions, considering the pervasiveness of secrets sprawl. We recently conducted research over 12 months to determine where enterprises’ secrets were residing within their systems, like GitHub, Confluence, Zendesk and Slack. In addition to API keys and passwords, secrets like SSL certificates, usernames and others are spilling into enterprises’ cloud environments and increasing the risk of a breach.

9 Leading Data Protection Alternatives to Metomic

When it comes to building a comprehensive data security strategy, everything hinges on finding and accurately classifying all your sensitive data. It seems security professionals have finally given up on legacy solutions that require extensive labeling and manual data mapping — and not a moment too soon. We're confident no one will mourn the passing of legacy solutions.

DLP 101: How to Prevent Data Exfiltration in the Cloud

These days, your organization's data is its most valuable asset. But what happens when that data slips through your fingers? Picture this: It's Friday afternoon, and your security team receives an alert about an unusual number of downloads from your cloud storage app, Google Drive. As you investigate, you realize it's corporate IP that's being downloaded en masse by a departing employee. This type of exfiltration incident isn't just hypothetical; it's a reality that organizations face on the daily.