Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

The Right Business Outcomes #Protegrity #cybersecurity #datacentric #ai #datasecurity

We are at an inflection point where AI, compliance, and quantum are exposing the dangerous fragility of traditional "envelope" security. The organizations that thrive in the next decade will be those that set their data free by embedding deterministic protection directly into the data itself. The organizations that lead the next decade won't just have better AI, they'll have better data security. Visit Protegrity.com to learn more.

How to Stop Sensitive Documents From Leaking in Slack, Gmail, and ChatGPT (Demo)

Your security tools can detect credit card numbers, but they are blind to the files that actually matter. In this demo, we show how sensitive documents like: Internal source code Financial forecasts Performance reviews Customer lists are automatically detected and blocked in Slack, Google Drive, SharePoint, Gmail, and even ChatGPT using Nightfall’s new AI-powered file classifiers. No regex. No keywords. No training data.

Top 5 2026-Ready Data Masking Solutions for Regulated Industries

In regulated industries, organizations are dealing with more sensitive data than ever before. This includes consumer IDs, financial and health-related data, and even behavioral insights. However, when this sensitive data finds its way into test, analytic, or development environments, it poses a direct compliance and security threat. This is where data masking comes in. It enables the use of realistic data by removing or modifying personal identifiers.

2025 Data Security Insights and Resources to Prepare for 2026

Data security in 2025 was less about reacting to breaches and more about surviving in a world where data is everywhere, attackers are faster, and trust is fragile. While the core goal of protecting sensitive information hasn’t changed, how organizations approach security has evolved significantly.

How GenAI is Changing Data Security and What Enterprises Must Do

Generative AI (GenAI) is changing data security in today's businesses. It affects both cybersecurity defenses and the types of threats we face. Organizations encounter innovations that boost detection and automate tasks. However, these changes also create new avenues for attack. Security leaders must understand this duality to protect systems and information. This article examines the dual impact of GenAI on enterprise security. We cover the opportunities it creates for defense and the new risks it introduces. Finally, we outline actionable strategies to protect your organization.

Safeguarding Patient Data in Medical Transportation: Closing the Cybersecurity Gaps

Non-emergency medical transportation (NEMT) sits at the intersection of healthcare, logistics and information technology. While the core job seems simple-bring patients to medical appointments and take them home safely-it involves sensitive health data, GPS tracking, scheduling, billing and communication between dispatchers, drivers, facility staff and patients.

AI and Data Security: Why Your Data Security Model Is Hurting Innovation

Why Your Data Security Model Is Outdated For over 20 years, we’ve focused on the Data Envelope—securing the perimeter, the cloud, and the network. But in a world of AI and rapid data sharing, protecting the envelope is not enough. In this video, James Rice (VP of Product Marketing at Protegrity) explains why traditional security has become the biggest bottleneck for modern innovation. Whether you are a security leader, a data architect, or a business innovator, understanding this paradigm shift is essential for the next decade of growth.

How Modern Businesses Are Strengthening Operations While Reducing Security Risks

The line between operational efficiency and cybersecurity has never been thinner. Every system you implement, every process you streamline, and every partner you onboard creates potential vulnerabilities that threat actors are eager to exploit. Yet standing still isn't an option. Businesses must scale, automate, and optimize to remain competitive. The key lies in choosing solutions and strategies that strengthen your security posture while improving operations.

When Customer Data Quietly Walks Out the Door: Lessons from the Coupang Breach

Large data breaches rarely begin with dramatic system failures. More often, they start with sustained, unauthorized access to sensitive data that goes undetected for months. The recent breach at Coupang, South Korea’s largest e-commerce platform, illustrates this pattern clearly. Nearly 34 million customer records were likely exposed over an extended period before detection.

Build a Context-Aware DLP Entity Detector Without Regex (Prompt-Based Detection Demo)

See how to build a prompt-based custom entity detector in Nightfall that understands context, not just patterns. Using a real healthcare example, you’ll see how prescription numbers are detected accurately while similar-looking data like purchase order numbers are ignored. You’ll see: Why regex breaks down in real workflows How prompt-based detection reduces false positives Creating a custom detector with positive and negative examples Deploying it to Slack and validating results across files.