Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Six Key Security Risks of Generative AI

Generative Artificial Intelligence (AI) has revolutionized various fields, from creative arts to content generation. However, as this technology becomes more prevalent, it raises important considerations regarding data privacy and confidentiality. In this blog post, we will delve into the implications of Generative AI on data privacy and explore the role of Data Leak Prevention (DLP) solutions in mitigating potential risks.

How do Cloud Access Security Brokers (CASBs) Work and Should I Use One?

As organizations increasingly adopt cloud services and applications, securing access to these services becomes crucial to protect sensitive data and maintain compliance. Cloud Access Security Brokers (CASBs) have emerged as a key component in providing comprehensive visibility and control over cloud services.

Defining Your Organization's Attack Surface: The 4 Types of Attack Surfaces

Attack surfaces are a fundamental concept within information security. However, attack surfaces can be constituted of different things. For example, some formulations of an attack surface include not just software and hardware, but the people using them. In this post, we’re going to cover four common types of attack surface, discuss how you should think about the risks associated with each type, and best practices for addressing these risks.

How to Prevent Credit Card Number Exposure in Slack for PCI Compliance

For many companies, a business credit card is part of the organization’s lifeblood. As such access to it must be vigilantly maintained. One potential area of risk is employees sharing credit card details in collaborative SaaS applications like Slack, where these details are at significant risk of being exposed to unauthorized parties.

How to Protect Customer Data in Zendesk - Part 3: Using Nightfall to protect critical stakeholder data

Nightfall’s Cloud DLP platform helps you limit access to sensitive data, by protecting the data where it is stored. With Nightfall you can redact, delete attachments, or make the data private in one click or via automated actions.

How to Protect Customer Data in Zendesk - Part 2: Addressing Sensitive Data Growth

The proliferation of sensitive data continues to grow unabated, particularly for support agents using Zendesk. The Zendesk’s CX Trends 2022 Report found that ticket volume had increased across all channels, with webform/email up 10% YoY and chat up 17% YoY.

Enabling Zero Trust Data Security through Security Awareness Education

In today's interconnected world, modern organizations face an ever-increasing array of cybersecurity threats. One of the most effective ways to protect sensitive data and ensure zero trust data security is by fostering a strong culture of security awareness among employees.

ChatGPT DLP Filtering: How to Use ChatGPT without Exposing Customer Data

Advancements in AI have led to the creation of generative AI systems like ChatGPT, which can generate human-like responses to text-based inputs. However, these inputs are at the discretion of the user and they aren’t automatically filtered for sensitive data. This means that these systems can also be used to generate content from sensitive data, such as medical records, financial information, or personal details.

Data Loss Prevention Buyer's Guide (Plus Free RFP Template)

Organizations are rapidly adopting SaaS and cloud infrastructure with 72% of orgs saying they’re defaulting to cloud-based services when adopting new tech according to Foundry (formerly IDG communications). For early adopters of cloud technology, their SaaS count may be north of 1,000 apps according to McAfee. Organizations who have no plan for their data when migrating to cloud are in for—forgive the pun—cloudy skies. We’re not afraid to use this analogy because.

Understanding the basics of Cloud Security: Cloud Privilege Escalation

Cloud privilege escalation is a growing concern for organizations as they embrace cloud-based infrastructure and services. To address the risks associated with privilege escalation, it's vital to implement robust security practices. In this post, we’ll cover privilege escalation as it relates to cloud security risk and the best practices for mitigation.