Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Australia's 2025 Protective Security Policy Framework (PSPF) Now Mandates Zero Trust - What You Need to Know and Do

Australia’s updated Protective Security Policy Framework (PSPF) now mandates the adoption of Zero Trust principles. Australia’s Protective Security Policy Framework (PSPF) Annual Release 2025 now formally mandates the adoption of zero trust principles to improve cybersecurity posture. Government organisations must now align their cybersecurity strategies with the Information Security Manual and the Guiding Principles to Embed a Zero Trust Culture.

How to Keep Your Data Secure as a Digital Nomad

As a digital nomad, your data is constantly at risk from cyber threats like weak passwords, phishing attacks and unsecured WiFi networks. In this video, we break down the biggest cybersecurity risks for digital nomads and share essential tips to keep your data safe — wherever you work.

Nightfall Product Updates & News: July/August 2025

This summer has been big for Nightfall. From launching Nyx, our AI copilot for DLP, to expanding our detection capabilities across more platforms, we’re making it easier than ever for security teams to protect sensitive data without slowing down work. In this update, you’ll find new AI-driven features and platform enhancements designed to make your DLP workflows smarter, faster, and more precise.

Cybersecurity in Fintech. Why Is It Important?

Financial technology has transformed the way people and businesses manage money. Mobile banking, online investment platforms, and payment apps are now part of daily life. Yet with this convenience comes an increased risk of cyberattacks. Sensitive financial data is a prime target for hackers, making cybersecurity in fintech not just a priority but a necessity. Even fintech API providers play a critical role in ensuring data is securely exchanged between platforms and applications. Without strong protection measures, the trust that fuels fintech growth could erode quickly.

What is Data Exfiltration: Threats, Techniques & How to Stop It

In 2025, data is everywhere, in your inbox, on your phone, and flowing through a maze of corporate servers. It’s the lifeblood of business, medicine, and everyday life. Unfortunately, that makes it irresistible to thieves. Not the smash‑and‑grab burglars of old but quiet intruders who watch and learn before they start siphoning off secrets. In cybersecurity circles, this quiet theft is called data exfiltration. There’s a good reason security experts are ringing alarm bells.

BYOK vs HYOK: What's the Difference and Which Approach Is Right for You?

As organizations move to the cloud, ensuring robust data security and privacy controls has become a top priority. Encryption is crucial for any organization’s cloud security and data sovereignty strategy; however, who controls the encryption keys can significantly affect the effectiveness of these measures.

Designing an Agentic AI Copilot: 8 Principles from Building Nyx

Everyone’s racing to build copilots right now. But making an agentic AI that feels like a trusted teammate—one that understands context, acts safely, and simplifies complex workflows—is harder than it looks. While building Nyx, our agentic AI copilot for security teams, our team spent a lot of time thinking about how to make her an effective team member - skilled and trustworthy.

AI and Compliance: Preventing Personally Identifiable Information Leakage

AI and Compliance: Preventing PII Information Leakage In this video, A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, delve into the growing security risks associated with the adoption of conversational AI bots and Large Language Models (LLMs), particularly in sensitive fields such as healthcare. Diptanshu Purwar highlights several key concerns.

Protect your Organization with Netwrix Data Security Posture Management

Would your team know if a hacker was moving through your systems right now? 45% of data breaches involve cloud-based data, often due to poor visibility and weak security posture. Every day, attackers exploit blind spots in data discovery, classification, and monitoring—gaining access to critical information undetected. Netwrix Data Security Posture Management (DSPM) puts an end to that. Ready to take control of your data security posture?

Insights on DSPM: Key Trends and Recommendations

Data Security Posture Management (DSPM) is emerging as a must-have solution for organizations dealing with sprawling hybrid and cloud environments. This blog explores what DSPM is, how it differs from other security approaches, why shadow data is a growing threat, and how Netwrix delivers proactive visibility, risk context, and integrated compliance features to strengthen your data security posture.