Italy Blocks Access to the Chinese AI Application DeepSeek to Protect Users’ Data

Italy’s data protection authority expressed dissatisfaction with DeepSeek’s response to its query about what personal data is collected, where it is stored and how users are notified.
The post Italy Blocks Access to the Chinese AI Application DeepSeek … Continue reading Italy Blocks Access to the Chinese AI Application DeepSeek to Protect Users’ Data

Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI.
The post Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hid… Continue reading Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats

Preparing financial institutions for the next generation of cyber threats

In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the next-generation threats institutions must prepare for, and the role of collaboration betwe… Continue reading Preparing financial institutions for the next generation of cyber threats

How secure are green data centers? Consider these 5 trends

As organizations increasingly measure environmental impact towards their sustainability goals, many are focusing on their data centers. KPMG found that the majority of the top 100 companies measure and report on their sustainability efforts. Because data centers consume a large amount of energy, Gartner predicts that by 2027, three in four organizations will have implemented […]

The post How secure are green data centers? Consider these 5 trends appeared first on Security Intelligence.

Continue reading How secure are green data centers? Consider these 5 trends

Why maintaining data cleanliness is essential to cybersecurity

Data, in all its shapes and forms, is one of the most critical assets a business possesses. Not only does it provide organizations with critical information regarding their systems and processes, but it also fuels growth and enables better decision-making on all levels. However, like any other piece of company equipment, data can degrade over […]

The post Why maintaining data cleanliness is essential to cybersecurity appeared first on Security Intelligence.

Continue reading Why maintaining data cleanliness is essential to cybersecurity

EU takes decisive action on healthcare cybersecurity

The Commission has presented an EU action plan aimed at strengthening the cybersecurity of hospitals and healthcare providers. The initiative is an essential step in shielding the healthcare sector from cyber threats. Digitalization is revolutionizing … Continue reading EU takes decisive action on healthcare cybersecurity

Router reality check: 86% of default passwords have never been changed

Misconfigurations remain a popular compromise point — and routers are leading the way. According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing […]

The post Router reality check: 86% of default passwords have never been changed appeared first on Security Intelligence.

Continue reading Router reality check: 86% of default passwords have never been changed

Preparing for the future of data privacy

The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk & Compliance Survey Report found that 82% of respondents cited data and cybersecurity concerns as their organization’s greatest risk. However, the majority of organizations […]

The post Preparing for the future of data privacy appeared first on Security Intelligence.

Continue reading Preparing for the future of data privacy

How to craft a comprehensive data cleanliness policy

Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential. But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are […]

The post How to craft a comprehensive data cleanliness policy appeared first on Security Intelligence.

Continue reading How to craft a comprehensive data cleanliness policy