Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

CMMC and CUI Compliance Glossary: Key Terms and Phrases

Starting November 10, Phase 1 of the US Department of Defense’s CMMC 2.0 program went into effect, marking the start of a phased three-year rollout. Phase 1 begins with Level 1 and 2 self-assessments and culminates with the full implementation of program requirements in Phase 4. Organizations that fail to demonstrate compliance will not be eligible to bid on U.S. Defense contracts.

Shadow AI: From Hidden Threat to Organizational Challenge

This blog post is adapted from a recent episode of The Cloudcast podcast featuring Rohan Sathe, CEO and co-founder of Nightfall AI. Listen to the full conversation here. Your employees are uploading company documents to ChatGPT. Your healthcare teams are transcribing sensitive call recordings and feeding them into LLMs. Your finance department is pasting confidential spreadsheets into publicly accessible AI tools. And unless you have visibility into these workflows, you have no idea it's happening.

Why Removing Document Metadata Matters

Most people consider a document only as words, numbers, and images that are presented on their screen. They think that when they export a file to PDF or attach it to an email, what is visible is all that exists. However, digital documents have a lot more information beneath the surface that are not visible to the casual eye but can be easily accessed by anyone who knows how to find them. The hidden layer of a document is called metadata, and it is much more important in data security than a lot of organizations acknowledging.

SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough Awards Program

SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that its Shopping Cart Inspect (SCI) solutions has been selected as winner of the "Data Leak Detection Solution of the Year" award in the 9th annual CyberSecurity Breakthrough Awards program. Conducted by CyberSecurity Breakthrough, an independent market intelligence organization, the annual program recognizes the most innovative companies, products, and technologies driving progress in the global information security industry.

Comparing NER Models for PII Identification

Identifying and redacting personally identifiable information (PII) is a critical need for enterprises handling sensitive data. Over 1000 NLP models and tools claim to solve this problem, but an infinite number of options opens a paradox of choice. We compiled this comprehensive comparison that examines ten notable PII detection solutions – their features, use cases, pros/cons, and reported success rates.

The Business Case for DSPM: Reducing Risk Through Continuous Visibility

Similar to many other industries today, modern IT is so complex. In the contemporary world, companies are dealing with data within cloud, on-premise, and hybrid environments. This complexity brings about serious security challenges that cannot be solved by conventional security tools. The solution is DSPM (data security posture management); it offers full-time visibility to your data. This will enable you to identify weak spots before an attack. It also assists you in staying secure and compliant and safeguarding your data.

E-Commerce Security: A Complete Guide to Protecting Your Online Store

When you shop online, you trust the website with your most personal information-your name, address, and credit card details. And if you expect safety as a customer, imagine how much responsibility an online store owner carries. That's why e-commerce security isn't just another technical task-it's the foundation of keeping your customers safe and your business trustworthy.