Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

DFARS 7012 Class Deviation and NIST 800-171 Rev 3 Guidance for DIBs

NIST 800-171 revision 3 was released on May 14, 2024, prompting DoD to issue an indefinite class deviation for DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting (DFARS 7012). US Defense Industrial Base (DIB) contractors must now comply with NIST SP 800-171 revision 2 rather than the version in effect at the time the solicitation is issued, as was previously required.

Is Slack using your data to train their AI models? Here's what you need to know.

AI is everywhere—but how can you be sure that your data isn’t being used to train the AI models that power your favorite SaaS apps like Slack? This topic reached a fever pitch on Hacker News last week, when a flurry of Slack users vented their frustrations about the messaging app’s obtuse privacy policy. The main issue?

What Are the Benefits of Using Data Masking Software in Ensuring Security?

Businesses face a crucial challenge of safeguarding sensitive data while ensuring compliance and enabling seamless operations. Data masking software emerges as a powerful solution, striking a balance between robust protection and practical utility. This innovative technology transforms sensitive information into fictitious yet realistic data, rendering it unrecognizable to unauthorized individuals while preserving integrity for legitimate uses.

How Do Cybercriminals Gather Personal Information About Their Targets?

Cybercriminals gather personal information about their targets by using social engineering techniques, looking at social media accounts and collecting data that gets leaked from public data breaches. The more personal information a cybercriminal can collect about their target, the easier it is for them to launch cyber attacks that their targets will easily fall for. Continue reading to learn more about how cybercriminals gather their target’s personal information and how you can keep your data safe.

How Should Sensitive Information Be Stored?

When we think about storing sensitive information, two types of information come to mind: digital data and physical data. While physical data can be securely stored in a physical vault, digital data should be stored in an encrypted cloud storage solution to protect it from common cyber threats. Continue reading to learn the best ways to store your sensitive physical and digital information, plus the storage methods to avoid.

Building your own AI app? Here are 3 risks you need to know about-and how to mitigate them.

After the debut of ChatGPT, and the ensuing popularity of AI, many organizations are leveraging large language models (LLMs) to develop new AI-powered apps. Amidst this exciting wave of innovation, it’s essential for security teams, product managers, and developers to ensure that sensitive data doesn’t make its way into these apps during the model-building phase.

5 things you need to know to build a firewall for AI

Everywhere we look, organizations are harnessing the power of large language models (LLMs) to develop cutting-edge AI applications like chatbots, virtual assistants, and more. Yet even amidst the fast pace of innovation, it’s crucial for security teams and developers to take a moment to ensure that proper safeguards are in place to protect company and customer data.

Improve Data Governance with DSPM Classification

Businesses struggle to find and protect sensitive data scattered across various sources. Manual tagging for classification is error-prone and inconsistent. Data Security Posture Management (DSPM) automates discovery, classification, and remediation – finding sensitive data, applying consistent tags, and fixing past mistakes. This ensures efficient and accurate data security, especially with ever-growing data volumes.

Secure Collaboration with DSPM Access Controls

Cloud storage is convenient but misconfigured access can expose data. Data Security Posture Management (DSPM) finds publicly accessible files and folders, fixing them to prevent leaks. It also tackles hidden risks in folder sharing by detecting sensitive information and preventing accidental oversharing. By automatically fixing these issues, DSPM keeps your cloud data secure while enabling collaboration.

Protect Data-at-Rest with DSPM Encryption

Data breaches threaten valuable info like PII and financial records. Data Security Posture Management (DSPM) with AI helps you find sensitive data and secure it. Encryption scrambles data using keys you can customize. DSPM automates encryption and enforces data protection policies to keep your information safe.