Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Nightfall's Spring 2025 Product Launch Brings DLP to the AI Era

The rapid adoption of AI, particularly generative AI tools like ChatGPT and Copilot, presents both immense productivity opportunities and significant data security challenges for organizations. While employees increasingly leverage AI for various business functions, this widespread use often occurs outside sanctioned channels, creating what's known as shadow AI.

What is FIPS 140-3?

Encryption has become a vital data protection tool used by global governments, defense and enterprises. However, not all solutions use the same cipher techniques. Several encryption algorithms can be used to secure data with varying levels of security. To establish acceptable standards for encryption technologies utilized by the U.S. Government, the National Institute of Standards and Technology (NIST) published the Federal Information Processing Standards (FIPS) FIPS-140.

How To Secure Data When Working With Freelancers and Subcontractors

Working with freelancers and subcontractors is essential for business growth, but it also introduces security risks. In this short video, learn the top security threats businesses face when working with freelancers and several tips you can use to secure your organization’s data.

The Role of Data Transfer Monitoring with DLP in Tracking Internal & External Data Movement

Data Loss Prevention (DLP) tools are crucial for protecting sensitive information as it moves within and outside an organization. They help prevent data leaks and unauthorized access by allowing organizations to monitor, control, and respond to potential data transfer risks. In this article, let’s learn more about how DLP tools play a vital role in secure data transfers.

Why Growing Businesses Are Turning to Managed IT Services

When your business expands, you need to stay relevant as you navigate the digital landscape. So, how do you achieve this? The best approach is to partner with competent and reliable tech experts. Sometimes, your trusted in-house teams may struggle to support the ever-changing IT demands. This may result in inefficiencies and operational challenges. This is where outsourcing to a trusted service provider comes in. The team will offer IT solutions that involve round-the-clock system monitoring to address potential issues before they disrupt your day-to-day operations.

10 Best practices for enterprise data loss prevention in 2025

Cybersecurity Insiders’ Insider Threat Report 2023 states that 74% of organizations are moderately or more vulnerable to insider threats, which demonstrates why organizations need resilient data loss prevention strategies. Your organization needs strong access controls and detailed monitoring systems to protect sensitive information effectively.

Securing Sensitive Information Amidst Divorce Proceedings

Divorce is a big change in life. It can bring up many emotions and hard decisions. One thing people often forget is how important it is to keep their personal and financial information safe. In today's world, it's easy for private data to fall into the wrong hands. During divorce proceedings, this risk can grow. Taking steps to protect your information can help you feel more in control during this time.

Why Partial DLP Coverage Leaves Your Data Exposed - And How to Fix It

At first, hearing this common refrain from security leaders comes as a shock. But if you know about the limitations of legacy data loss prevention (DLP) solutions, this statement makes perfect sense. Legacy DLP can leave security teams with the assumption that they have full control over their data risk profile and vectors. In reality, blind spots can occur in any security configuration.

The State of Data Security: A Distributed Crisis

Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. In this episode, our host Caleb Tolin speaks with Joe Hladik, a veteran security expert with two decades of experience, to explore the evolving landscape of cybersecurity, incident response, and the critical challenges of data security in today's distributed environments.