Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

2025 Data Security Insights and Resources to Prepare for 2026

Data security in 2025 was less about reacting to breaches and more about surviving in a world where data is everywhere, attackers are faster, and trust is fragile. While the core goal of protecting sensitive information hasn’t changed, how organizations approach security has evolved significantly.

How GenAI is Changing Data Security and What Enterprises Must Do

Generative AI (GenAI) is changing data security in today's businesses. It affects both cybersecurity defenses and the types of threats we face. Organizations encounter innovations that boost detection and automate tasks. However, these changes also create new avenues for attack. Security leaders must understand this duality to protect systems and information. This article examines the dual impact of GenAI on enterprise security. We cover the opportunities it creates for defense and the new risks it introduces. Finally, we outline actionable strategies to protect your organization.

Safeguarding Patient Data in Medical Transportation: Closing the Cybersecurity Gaps

Non-emergency medical transportation (NEMT) sits at the intersection of healthcare, logistics and information technology. While the core job seems simple-bring patients to medical appointments and take them home safely-it involves sensitive health data, GPS tracking, scheduling, billing and communication between dispatchers, drivers, facility staff and patients.

AI and Data Security: Why Your Data Security Model Is Hurting Innovation

Why Your Data Security Model Is Outdated For over 20 years, we’ve focused on the Data Envelope—securing the perimeter, the cloud, and the network. But in a world of AI and rapid data sharing, protecting the envelope is not enough. In this video, James Rice (VP of Product Marketing at Protegrity) explains why traditional security has become the biggest bottleneck for modern innovation. Whether you are a security leader, a data architect, or a business innovator, understanding this paradigm shift is essential for the next decade of growth.

How Modern Businesses Are Strengthening Operations While Reducing Security Risks

The line between operational efficiency and cybersecurity has never been thinner. Every system you implement, every process you streamline, and every partner you onboard creates potential vulnerabilities that threat actors are eager to exploit. Yet standing still isn't an option. Businesses must scale, automate, and optimize to remain competitive. The key lies in choosing solutions and strategies that strengthen your security posture while improving operations.

When Customer Data Quietly Walks Out the Door: Lessons from the Coupang Breach

Large data breaches rarely begin with dramatic system failures. More often, they start with sustained, unauthorized access to sensitive data that goes undetected for months. The recent breach at Coupang, South Korea’s largest e-commerce platform, illustrates this pattern clearly. Nearly 34 million customer records were likely exposed over an extended period before detection.

Build a Context-Aware DLP Entity Detector Without Regex (Prompt-Based Detection Demo)

See how to build a prompt-based custom entity detector in Nightfall that understands context, not just patterns. Using a real healthcare example, you’ll see how prescription numbers are detected accurately while similar-looking data like purchase order numbers are ignored. You’ll see: Why regex breaks down in real workflows How prompt-based detection reduces false positives Creating a custom detector with positive and negative examples Deploying it to Slack and validating results across files.

20 Causes of Data Loss Threatening Businesses in 2026

Data is not just a strategic asset. It’s the lifeblood of your organization. Losing access to any strategic asset can threaten an organization’s viability; without plants and equipment, manufacturers would find it difficult to succeed, and service providers can’t operate without brand recognition. Similarly, without data, your organization could be left in a state of complete and utter paralysis, unable to function or recover.

Create Custom File Classifiers with Nightfall AI. No Regex Required

DLP solutions have a challenge in detecting standard document types: financial records, source code, and customer lists. Moreover, what happens when your organization needs to protect business-critical documents that don't fit pre-built categories? Or when you need more granular classification to support specific workflows? Traditional approaches force you to choose between brittle regex patterns that generate false positives.

Create Highly Specific File Classifiers with Nightfall's Prompt-Based AI. No Regex Required

Many sensitive documents don’t fit cleanly into standard categories, and traditional approaches like regex or broad classifiers often create noise and false positives. In this video, we walk through how to use Nightfall’s prompt-based file classifiers to detect business-critical documents based on intent, not brittle patterns or custom model tuning.