Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Dangers of Rushing into AI Adoption: Lessons from DeepSeek

As organizations race to adopt the latest advancements in artificial intelligence, DeepSeek serves as a cautionary tale about the potential dangers of rushing into the hype cycle without adequate consideration of security and ethical implications. DeepSeek, a Chinese AI startup, has been identified as having several significant security risks and vulnerabilities that could pose threats to both the company and its users.

Monitor your Atlassian audit records and event logs with Datadog Cloud SIEM

Collaboration platforms like Atlassian Jira and Atlassian Confluence contain sensitive company and employee data, making them critical targets for cyberattacks. Teams use Jira to track and manage projects, and rely on Confluence as an internal knowledgebase for documentation, company policy guides, team wikis, and more. Atlassian organizations, which provide a centralized place for admins to manage their Atlassian products and users, are also prime targets.

PCI DSS 4.0.1 Compliance at Scale: A Practical Guide for Payment Processors SAQ D

Guide for Payment Processors SAQ D begins with a major challenge in today’s digital payment landscape. Payment processors must secure payment pages across thousands of merchant websites, far beyond managing a single payment system. Let’s put this in perspective: Real-world example: A payment processor with 10,000 merchants needs to monitor approximately 30,000 payment pages daily. That’s 30,000 potential points of vulnerability requiring constant surveillance.

What is Sensitive Data? Sensitive Data Definitions, Types & Examples

Sensitive data is information that must be protected against unauthorized disclosure. It can be in physical or electronic form and includes PII (Personally identifiable information), PHI (Protected health information), and more. There are three main types of sensitive data that hackers and malicious insiders tend to exploit: personal, business, and classified information.

Sensitive Data Leaks from AI Model Use | The 443 Podcast

How are you using ChatGPT at work? On this week's episode of, Corey Nachreiner and Marc Laliberte dig into a report on sensitive data leakage caused by AI model use. They also cover a recent report that highlights a drop in ransomware payments in 2024, as well as a recent attack targeting ASP.NET web servers.

Episode 15: Are You Making This Mistake With Your Endpoint Security? ft. Santhosh Narasimhamoorthy

Welcome to another electrifying episode of Server Room! This week, we’re tearing up the rulebook on cybersecurity with Santhosh Narasimhamoorthy, Manager and Technical Evangelist for Endpoint Management Security. Buckle up as we explore how AI is not just a buzzword—it’s rewriting the play book for protecting every device, user, and byte in your network. Timestamps: Perfect for: IT managers, CISOs, and anyone who’s ever side-eyed a “Nigerian prince” email.