AI tools put companies at risk of data exfiltration

Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating swift action is needed, according to Code42. Since 2021, there has been a 28%… Continue reading AI tools put companies at risk of data exfiltration

Secure your hybrid workforce: The advantages of encrypted storage

In this Help Net Security video, Ryan Amparo, Field Application Engineer at Kingston Technology, discusses the benefits of encrypted external SSDs and USBs for hybrid workforces. He talks about the differences between software and hardware encryption, … Continue reading Secure your hybrid workforce: The advantages of encrypted storage

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The US National Institute of Standards and Technology’s framework defines federal policy, but it can be used by private enterprises, too. Here’s what you need to know. Continue reading NIST Cybersecurity Framework: A Cheat Sheet for Professionals

A step-by-step plan for safe use of GenAI models for software development

If you are a large-scale company, the recent AI boom hasn’t escaped your notice. Today AI is assisting in a large array of development-related and digital-related tasks, from content generation to automation and analysis. The development of AI is rapid… Continue reading A step-by-step plan for safe use of GenAI models for software development

Inside the strategy of Salesforce’s new Chief Trust Officer

Recently, Salesforce named Brad Arkin, previously Chief Security & Trust Officer at Cisco, the company’s new Chief Trust Officer. This was the perfect opportunity to find out more about his plans. In this Help Net Security interview, Arkin discuss… Continue reading Inside the strategy of Salesforce’s new Chief Trust Officer

AI outsourcing: A strategic guide to managing third-party risks

In an era of artificial intelligence (AI) revolutionizing business practices, many companies are turning to third-party AI services for a competitive edge. However, this approach comes with its own set of risks. From data security concerns to operation… Continue reading AI outsourcing: A strategic guide to managing third-party risks

Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Read more about the commercial surveillance vendors threat and its ecosystem and learn how to protect from it. Continue reading Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Data residency: What is it and why it is important?

Data residency is a hot topic, especially for cloud data. The reason is multi-faceted, but the focus has been driven by the General Data Protection Regulation (GDPR), which governs information privacy in the European Union and the European Economic Area. The GDPR defines the requirement that users’ personal data and privacy be adequately protected by […]

The post Data residency: What is it and why it is important? appeared first on Security Intelligence.

Continue reading Data residency: What is it and why it is important?

Paying ransoms is becoming a cost of doing business for many

Today’s pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ‘do not pay’ policies, with data recovery deficiencies compounding the problem, according to Cohesity. In fact, most companies have paid a ransom in the… Continue reading Paying ransoms is becoming a cost of doing business for many

Data security posture management vs cloud security posture management

“A data breach has just occurred”, is a phrase no security professional wants to hear. From the CISO on down to the SOC analysts, a data breach is the definition of a very bad day. It can cause serious brand damage and financial loss for enterprises, lead to abrupt career changes among security professionals, and […]

The post Data security posture management vs cloud security posture management appeared first on Security Intelligence.

Continue reading Data security posture management vs cloud security posture management