How AI Will Transform Data Security

I’ve often wondered whether artificial intelligence (AI) in cybersecurity is a good thing or a bad thing for data security. Yes, I love the convenience of online stores suggesting the perfect items for me based on my search history, but other times it feels a bit creepy to have a pair of shoes I looked […]

The post How AI Will Transform Data Security appeared first on Security Intelligence.

Continue reading How AI Will Transform Data Security

Understanding Certificate Policies and Practice Statements

Public key infrastructure (PKI) is the sort of technology that most users take for granted. They use it every day in a variety of ways but most don’t even realize it. PKI manages the digital certificates that encrypt sensitive data, secures web browsi… Continue reading Understanding Certificate Policies and Practice Statements

User data privacy decisions can be easily manipulated

Data privacy is an important topic in the digitalized economy. Recent policy changes have aimed to strengthen users’ control over their own data. Yet new research from Copenhagen Business School finds designers of cookie banners can affect users&… Continue reading User data privacy decisions can be easily manipulated

Government IT decision makers worried about security risks related to cloud migration

Nearly 70% of U.S. government IT decision makers surveyed view security risks as the top barrier when migrating to modern cloud platforms, a Morning Consult survey reveals. Of those surveyed, security also now outweighs reducing costs by almost double … Continue reading Government IT decision makers worried about security risks related to cloud migration

How prepared are organizations for the challenges of the changing SAP landscape

The Tricentis, Capgemini and Sogeti report explores current SAP adoption and implementation trends, and organizations’ preparedness to deal with the challenges emerging from the changing SAP landscape. “SAP’s ERP system acts as the backbone of business… Continue reading How prepared are organizations for the challenges of the changing SAP landscape

API Abuse Is a Data Security Issue Here to Stay

Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will be the most common type of attack seen in 2022. So, what problems exactly do APIs face? And what can data security defenders do about it?  Prevalent […]

The post API Abuse Is a Data Security Issue Here to Stay appeared first on Security Intelligence.

Continue reading API Abuse Is a Data Security Issue Here to Stay

API Abuse Is a Data Security Issue Here to Stay

Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will be the most common type of attack seen in 2022. So, what problems exactly do APIs face? And what can data security defenders do about it?  Prevalent […]

The post API Abuse Is a Data Security Issue Here to Stay appeared first on Security Intelligence.

Continue reading API Abuse Is a Data Security Issue Here to Stay

Comforte AG Announces New Partnership with ITKaa

Wiesbaden, Germany – 22 July 2021 – ITKaa and comforte are teaming up to help clients secure their business from the inside out by leveraging comforte’s leading edge technology for systematically discovering, classifying, and protecting sensitive … Continue reading Comforte AG Announces New Partnership with ITKaa

Securing UX in Open Banking Apps

Historically, only large, well-established banks had control over the majority of consumer and corporate finances, making it highly challenging for smaller financial services providers to break into the market. Open banking has transformed the way org… Continue reading Securing UX in Open Banking Apps

How (and Why) Hacker Forums Self-Moderate

“Everything in moderation,” the saying goes. But it may come as a surprise that this expression even seems to apply to many of the hacker forums littered across the dark web. On the surface, these forums may appear to be a lawless landscape, but there… Continue reading How (and Why) Hacker Forums Self-Moderate