Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Australian organisations are so focused on preventing data breaches that they’re unaware that the concern of most of their customers has more to do with privacy. Continue reading Australian Organisations Struggling to Resolve Tensions Between Personalisation, Privacy

Data Security: Leveraging AI for Enhanced Threat Detection and Prevention

By Uzair Amir
In today’s ever-evolving cyberspace, organizations face an ever-increasing number of cyber threats. Malicious actors are constantly seeking to…
This is a post from HackRead.com Read the original post: Data Security: Leveraging AI fo… Continue reading Data Security: Leveraging AI for Enhanced Threat Detection and Prevention

Security considerations during layoffs: Advice from an MSSP

Navigating layoffs is complex and difficult for many reasons. Not only do human resources and direct managers bear the onus of responsibility when conducting exit conversations, but security teams should also make the necessary preparations for monitor… Continue reading Security considerations during layoffs: Advice from an MSSP

If you prepare, a data security incident will not cause an existential crisis

Why is it that when a company becomes aware of a potential data security incident, the team working on it (and others who are made aware that “something” is going on) have an immediate and overwhelming feeling that the company is doomed? And yet, when … Continue reading If you prepare, a data security incident will not cause an existential crisis

Data security and cost are key cloud adoption challenges for financial industry

91% of banks and insurance companies have now initiated their cloud journey, a significant increase from 2020, when only 37% of firms had embarked on their cloud transformations, according to Capgemini. However, this high rate and its corresponding inv… Continue reading Data security and cost are key cloud adoption challenges for financial industry

5 common data security pitfalls — and how to avoid them

Data protection has come a long way. In previous years, it was considered a “nice to have” and a line item on the budget further down the page. Today, it’s top of mind for almost every CIO or CISO across all industries. Yet many organizations are caught in the crosshairs of cybersecurity challenges, often due […]

The post 5 common data security pitfalls — and how to avoid them appeared first on Security Intelligence.

Continue reading 5 common data security pitfalls — and how to avoid them

AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Bringing artificial intelligence into the cybersecurity field has created a vicious cycle. Cyber professionals now employ AI to enhance their tools and boost their detection and protection capabilities, but cybercriminals are also harnessing AI for the… Continue reading AI’s efficacy is constrained in cybersecurity, but limitless in cybercrime

Best practices for cloud configuration security

Cloud computing has become an integral part of IT infrastructure for businesses of all sizes, providing on-demand access to a wide range of services and resources. The evolution of cloud computing has been driven by the need for more efficient, scalable and cost-effective ways to deliver computing resources. Cloud computing enables on-demand access to a […]

The post Best practices for cloud configuration security appeared first on Security Intelligence.

Continue reading Best practices for cloud configuration security

Aim for a modern data security approach

Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Many organizations no long… Continue reading Aim for a modern data security approach

Three security data predictions for 2024

How do companies protect their digital environments in a world where everything is growing more complex, quickly – data, customer expectations, cyber threats and more? It’s difficult: Adversaries are adopting and using AI and even generative AI-based t… Continue reading Three security data predictions for 2024