Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Data-Centric Security: Protect Your Most Valuable Asset-Your Data

You’re sitting in your office, staring at a screen filled with data. Customer information, financial records, sensitive business intel – it’s all there, flowing through your systems like digital lifeblood. That data, however, isn’t just sitting behind your firewall anymore. It’s zipping across cloud platforms, being crunched by AI models, and shared with partners across the globe. Welcome to the new reality of data security.

APIs: The Silent Highway for Sensitive Data

Think about how your banking app connects to payment processors or how your healthcare provider’s system shares records securely – APIs have become essential for modern digital interactions, enabling applications to communicate and share data effortlessly. However, this convenience comes at a cost: APIs often handle vast amounts of Personally Identifiable Information (PII), making them prime targets for API data exfiltration.

Insider Risk with Nightfall DLP: Episode 1 - Prevent Personal Cloud Store Uploads

Insider risk is a tricky challenge for security teams: how can you tell the good actors from the bad, or intentional actions from mistakes? Anyone with approved access to endpoints and SaaS systems could expose data to exfiltration risk if those systems are focused solely on preventing outsiders from getting in.

The file and SaaS data perimeter is broken: data security needs data lineage

We are in the midst of a major technological shift. And when shifts happen, new industry-defining companies emerge. The winners aren’t just those with great ideas—they are the ones who adapt and respond to change the fastest.

Implementing DLM for Robust Protection Against Cyber Attacks

Want to strengthen your organization's cyber defenses? By 2025 cybercrime will cost the world $10.5 trillion each year making it essential to defend your devices against cyber attacks. Organizations spend an average of 194 days discovering breaches and then require another 292 days to contain them.

Protecting Software Data: Securing Ways To Export Work Items From Jira

Having your software data is paramount: System administrators, data analysts, auditors, and software security experts face the challenge of securely extracting valuable information from Jira while ensuring efficiency, compliance, and data integrity. Fortunately, counting on reliable solutions to export issues or work items from Jira is a task that can be securely and efficiently covered.
Featured Post

Partnering to Overcome the Skills Gap in Cloud Computing

For organisations that are always trying to leverage the latest technology to gain an edge over their competitors, utilising public cloud computing is at the top of the list for most decision makers. The scalability and cost-effectiveness, along with businesses not needing to invest in traditional infrastructure and having it managed by a third party, offers a myriad benefits for companies in all industries.

Inside a Cyberattack: How Hackers Steal Data

The truth about cybersecurity is that it's almost impossible to keep hackers outside of an organisation, particularly as the cybercrime industry becomes increasingly sophisticated and their technology more advanced. Furthermore, once a hacker has broken through an organisation's defences, it is relatively easy to move within the network and access information without being detected for days and even months. This is a significant concern for Banking and Financial Services organisations, which house valuable sensitive and Personally Identifiable Information (PII).

Data at Risk: 96% of Ransomware Attacks Involve Data Theft

A new report from Arctic Wolf has found that 96% of ransomware attacks now involve data theft as criminals seek to force victims to pay up. “As potential victims implemented more reliable backup and restoration processes, ransomware operators introduced data exfiltration as a means to apply additional pressure and protect their revenue streams,” Arctic Wolf says.

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a global security framework established by major credit card brands that outlines security requirements for any organization handling cardholder data, including encryption, access control, and network security. PCI DSS is regularly updated, and Version 4.0, effective March 2025, focuses on allowing organizations to tailor security controls to their specific needs.