Dawn Cappelli on the global threat environment

The gloves are off: the threat environment has escalated! Global conflicts have led to a surge in cyberattacks targeting critical infrastructure. Tune in to the latest episode of the Data Security Decoded podcast for a fantastic conversation with Dawn Cappelli that covers rising global tensions, the rapidly evolving threat landscape, and how to secure OT environments from bad actors. Subscribe to our channel and never miss an episode!

When Sensitive Data Becomes a Picture: Introducing ML-Powered Image Classification for DLP

Dr. Carter finishes a long shift at the hospital, exports a patient X-ray as a regular image file, and drags it into an AI assistant to double-check a diagnosis. The image included the patient’s name and ID. Across town, Jason, a travel agent, scans a stack of passports and uploads the images to an AI tool to automatically fill bookings. In a support center, Sarah snaps a quick photo of a credit card and sends it to an AI service to avoid retyping the number.

Keeping the Factory Floor Up and Running

The failure of a server that manages crucial elements of an automated factory floor operation, halting production, is the greatest fear of any OT leader. As factories become more automated, finding a solution becomes crucial. Watch this video to learn how to build fault-tolerant factory floors with Acronis Cyber Protection for OT. Speaker: Michael Bova | Enterprise Account Executive at Acronis.

Safe agentic commerce starts with KYA and dynamic IDV

Product, fraud, and trust and safety teams at online merchants and marketplaces have been fighting bots for a long time. While there were occasional disagreements about how “bad” bots were (a purchase is a purchase, some might say), the general consensus often ranged from suspicious to block them all. But not anymore. As AI-powered browsers and agents become more commonplace, online merchants have to prepare for a world where agentic commerce is a standard sales channel.

The Evolution of Endpoint Protection in Response to Advanced Threats

Endpoint protection helps keep everyday devices safe. In an organization, various types of endpoints are used, like desktops, laptops, and servers. These devices are often the first targets that attackers try to use to break into an organization’s infrastructure. In the past, protection meant blocking known viruses. That approach worked when threats were easy to recognize. Now, attacks have become more advanced and harder to detect.

The Strengths and Shortcomings of AI Control Tower

This is why platforms like ServiceNow AI Control Tower are showing up in governance roadmaps. Control Tower helps organizations standardize how AI systems are requested, reviewed, cataloged, and managed across their lifecycle. It can bring order to chaos. But there’s a second, equally important reality: the strongest governance workflow in the world can’t govern what it can’t see.

What You Need to Know about the Illinois Department of Human Services Data Breach

The Illinois Department of Human Services (IDHS) is one of the state’s largest agencies, with over 15,000 employees. Created in 1997, it provides residents with streamlined access to integrated services, especially those who face multiple barriers to self-sufficiency and others who are striving for economic independence.