Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2023

Solving Privileged Access Management Challenges in Microsoft 365 & SharePoint

The recent US National Guard leak has once again focused attention on the risk that overprivileged access poses. A massive intelligence breach occurred when Massachusetts US National Guardsman Jack Teixeira, an IT specialist with a top secret security clearance, accessed and printed classified files and posted them to a civilian Discord chat room. He did this after having been previously reprimanded for his mishandling of classified information.

Data Exfiltration: Prevention, Risks & Best Practices

Imagine a scenario where a competitor gains access to your organization's most sensitive data, causing severe financial loss and irreparable damage to your reputation. This nightmare can become a reality through data exfiltration. Data exfiltration is a real threat to organizations, as it involves the unauthorized transfer of sensitive information, the effects of which can lead to operational disruption, financial losses and damage to reputation.

Enhance Security and Efficiency for your Unstructured Data with Rubrik and Dell

Unstructured data is a prime target for ransomware attacks, making it crucial for organizations to protect and manage it effectively. Currently, it is estimated that 80-90% of all data generated falls into the unstructured category, consisting of files and objects. Organizations rely on unstructured data to store sensitive information, intellectual property, and other invaluable corporate assets.

The Basics of Cloud Security Glossary

What is it: Agentless architecture refers to platforms and services that are built to run as cloud-native applications. They require no installation, patching, or other forms of long term upkeep on the part of a user. Why it matters: Agentless applications, especially agentless security applications have a lower total cost of ownership (TCO), in terms of man-hours saved in deployment, maintenance, and overhead.

How to remove PII from your Elastic data in 3 easy steps

Personally identifiable information (PII) compliance is an ever-increasing challenge for any organization. Whether you’re in ecommerce, banking, healthcare, or other fields where data is sensitive, PII may inadvertently be captured and stored. Having structured logs enables quick identification, removal, and protection of sensitive data fields easily; but what about unstructured messages? Or perhaps call center transcriptions?

How to Prevent Data Theft by Departing Employees: 7 Best Practices

Departing employees are a source of insider threats that often get overlooked. According to a study by Biscom, more than one in four departing employees steal data when leaving. Whether they do so out of negligence or with malicious intent, such cases can only have negative outcomes for organizations, from loss of competitive advantage to penalties for non-compliance with cybersecurity requirements.

How to Protect Your Sensitive Information: A Guide to Keeping You Safe Online

Have you or someone you know been a victim of a breach of your privacy? Would you know if you did? The majority of people tend not to worry about breaches in their privacy until it’s too late. By this point, your confidential information may already be in the wrong hands. Not to worry, though; this article will equip you with the tools to construct your own personal shield, which will defend you against the possible ways in which your data may be used to directly cause you or your business harm.

Protegrity for Snowflake: Cross-Border Data Movement Made Easy

Organizations must constantly adapt to the challenges of maintaining compliance while handling data. Nowhere is that more apparent than cross-border data protection, which allows data to be and remain protected across jurisdictions, states, counties, and countries with the right data security tools. According to the United Nations, 137 of 197 of its members have data and privacy legislation in place.

Dynamic Data Masking | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data. Key highlights from the discussion.

The Cybersecurity Risks of AI & How to Safeguard Sensitive Data

Experts in the cybersecurity industry are becoming increasingly concerned about artificial intelligence attacks. A 2020 report from Forrester Consulting found that 88% of decision-makers in the security industry believed offensive AI was on the horizon, and almost two-thirds of them expected AI to lead new attacks.

Nightfall Named As A Leader in Data Security by G2 - Summer '23

We're excited to share that Nightfall has been named as a Leader in Data Security in G2's Summer '23 rankings. Huge thank you to our customers and supporters who made this possible, and to our dedicated team who works so hard to keep their cloud data safe. This year has been busy, with the release of our Zendesk Integration, which provides market-leading AI-powered DLP to the most widely used customer support platform.

What Is Personally Identifiable Information (PII)?

Personally Identifiable Information (PII) is any data that can identify a specific individual. Data like your Social Security number allows you to open credit cards, get a loan and more. It’s also data that is vital to keep secure in order to protect your identity and assets. Read on to learn more about what types of information qualify as personally identifiable information and how to protect it from cybercriminals.

New Integration Between NC Protect and Janusseal Offers Robust Classification and Dynamic Data Protection for Customers

archTIS is pleased to announce we have partnered with Janusnet, a global leader in data classification, to offer robust classification and dynamic data protection for joint Defence and industry customers looking to implement data-centric zero trust security to protect sensitive information.

How to Keep Your Data Safe Online

There are risks associated with providing your confidential information online, but it’s necessary in a modern world that requires Personally Identifiable Information (PII) to create accounts, purchase goods online, complete your taxes or receive a paycheck. Your data could become vulnerable through no fault of your own. Data breaches are common, and your account information could get leaked. If your data is intercepted by threat actors, it could be sold to cybercriminals on the dark web.

Explainer: Data Governance & You

Welcome to the era of data domination! Every day, 2.5 quintillion bytes of data flood the digital landscape, estimates Forbes, with a whopping 90% of data created in just the last two years. While this growth presents many opportunities for organizations, it also introduces many challenges. That’s where data governance comes in. It’s a critical practice for businesses trying to navigate data management and data security.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Supporting Sustainability Through Data Security

Netskope is proud to participate in Vision 2045: an initiative aimed to raise awareness on private industry’s role in sustainability. In this video, Netskope experts examine how cybersecurity and data protection are intrinsically linked to sustainability. We invite you to watch and to learn more about how data security is paramount to a more sustainable future.

Capturing Secrets from Environment Variables via CircleCI

CircleCI is a platform that enables continuous integration and delivery of software projects. It allows teams to automate their software development process by building, testing, and deploying their code changes in a consistent and reliable manner. In this blog post, we will explore the Tactics/Techniques/Procedures (TTP) of how environment variables that house sensitive credentials and secrets can be exfiltrated using Circle CI.

Redefining Personal Data: Understanding the EU General Court's Ruling on Pseudonymized Data

In a ruling made on April 26, 2023, the General Court of the European Union (EU) made a groundbreaking decision changing the definition of personal data that has been in place since the adoption of the General Data Protection Regulation (GDPR). This ruling has significant data-sharing implications for organizations within the EU and enables them to share data with third parties more easily, as long as it’s appropriately de-identified.

Warning: Sharing Data with ChatGPT Can Be Misused Outside Your Organization

A new study found that ChatGPT can accurately recall any sensitive information fed to it as part of a query at a later date without controls in place to protect who can retrieve it. The frenzy to take advantage of ChatGPT and other AI platforms like it has likely caused some to feed it plenty of corporate data in an effort to have the AI process and provide insightful output based on the queries received.

AI and Deep Learning At Work: How to Know If Your Images Are Storing Sensitive Information

In today’s rapidly digitizing world, the importance of data security has become paramount. With the increasing amount of sensitive information being shared and stored online, securing information from cyber attacks, information breaches, and theft has become a top priority for companies of all sizes. Data loss prevention (DLP) is a critical part of the Netskope Intelligent Security Service Edge (SSE) security platform, providing best-in-class data security to our customers.