Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

SecurityMetrics Wins "Data Leak Detection Solution of the Year" in 2025 CyberSecurity Breakthrough Awards Program

SecurityMetrics, a leading innovator in compliance and cybersecurity, today announced that its Shopping Cart Inspect (SCI) solutions has been selected as winner of the "Data Leak Detection Solution of the Year" award in the 9th annual CyberSecurity Breakthrough Awards program. Conducted by CyberSecurity Breakthrough, an independent market intelligence organization, the annual program recognizes the most innovative companies, products, and technologies driving progress in the global information security industry.

Comparing NER Models for PII Identification

Identifying and redacting personally identifiable information (PII) is a critical need for enterprises handling sensitive data. Over 1000 NLP models and tools claim to solve this problem, but an infinite number of options opens a paradox of choice. We compiled this comprehensive comparison that examines ten notable PII detection solutions – their features, use cases, pros/cons, and reported success rates.

The Business Case for DSPM: Reducing Risk Through Continuous Visibility

Similar to many other industries today, modern IT is so complex. In the contemporary world, companies are dealing with data within cloud, on-premise, and hybrid environments. This complexity brings about serious security challenges that cannot be solved by conventional security tools. The solution is DSPM (data security posture management); it offers full-time visibility to your data. This will enable you to identify weak spots before an attack. It also assists you in staying secure and compliant and safeguarding your data.

E-Commerce Security: A Complete Guide to Protecting Your Online Store

When you shop online, you trust the website with your most personal information-your name, address, and credit card details. And if you expect safety as a customer, imagine how much responsibility an online store owner carries. That's why e-commerce security isn't just another technical task-it's the foundation of keeping your customers safe and your business trustworthy.

When Collaboration Tools Become Exfiltration Channels: What the Palantir Case Reveals

Last week, Palantir filed a lawsuit in Manhattan federal court alleging that two former senior engineers used Slack to transfer confidential documents - including healthcare demonstration frameworks, revenue cycle diagrams, and customer deployment plans - the day after one of them gave notice. The documents were allegedly accessed later on a personal phone. The engineers had since joined Percepta, a competing AI startup backed by General Catalyst that emerged from stealth mode in October.

Embracing Zero Trust: Lessons from Australia's Defence Supply Chain Data Breach

Earlier this week, The Australian broke the news that the Cyber Touhan hacking group stole classified plans for Australia’s new infantry fighting vehicles, a $7B AUD procurement program, in a massive cyber-attack targeting 17 Israeli defence contractors in the supply chain. The attack was carried out by targeting a downstream supplier, MAYA Technologies, exploiting vulnerabilities in their network and peripherals to gain access to sensitive data.

AI Browsers Are Silently Exfiltrating Sensitive Data - and Legacy DLP Can't See It

A new class of AI-powered browsers are rewriting the rules of data security. While CISOs focus on traditional vectors, employees are unknowingly creating permanent backdoors to your most sensitive data through browsers that remember everything, sync everywhere, and share it all with AI models. The bottom line: If you're not actively protecting against AI browser exfiltration, you're already leaking data. Here's why it's happening, what it costs, and how to stop it today.