Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Maximizing Microsoft Sensitivity Labels in M365, SharePoint, Outlook and more

Data governance and protection are crucial in safeguarding sensitive information. Proper classification and data labeling is essential to ensure that the right people access the right information. Failure to implement these practices can result in data breaches, financial loss, and harm to an organization’s reputation.

Leadership Less Involved in Cyber-Preparedness Despite a Majority of Orgs Thinking Data Loss from a Cyber Attack Likely in the Next 12 Months

You probably expect executive leadership to not just support cybersecurity efforts, but to be involved. New data shows organizations have a way to go until this is a reality. Even if an organization is completely supportive of the cybersecurity strategy, it can’t exist in a technical bubble only. It requires a lot of input – from planning to implementation – to ensure that required business objectives are met as security controls become part of operations and resiliency plans.

Key Management & BYOK in Microsoft 365 for GDPR Compliance

Microsoft Azure and Microsoft 365 are among the leading cloud services globally, but their limited Bring Your Own Key (BYOK) capabilities pose potential data security and compliance issues for organisations that must comply with the EU and global data sovereignty laws. Increased government concern over protecting sensitive personal, business, government and defence data in the Cloud has led to a complex regulatory landscape that aims to maintain control of citizen and government data.

Hidden Data Exfiltration Using Time, Literally

I was looking at my watch last week and my attention was moved towards the seconds over at the right of the watch face, incrementing nicely along as you’d expect. Now, I don’t know if I’d just spent too long staring at a debugger screen or if it was something in the air, but an idea dawned on me, related to all things command and control, data exfiltration, etc.

Nightfall AI and Snyk Partner to Offer Developers AI-Powered Secrets Scanning

SAN FRANCISCO, Oct. 12, 2023—Nightfall AI, the leader in cloud Data Leak Prevention (cloud DLP), today announced a partnership with Snyk, a leading developer security provider, to offer developers AI-powered secrets-scanning capabilities. Snyk and Nightfall are partnering to co-sell Nightfall's DLP platform alongside Snyk's Developer Security Platform.

Nightfall Partnered with Snyk to Make Developers' Lives Easier. Here's How.

As we announced earlier today, Nightfall is thrilled to team up with Snyk to provide a state-of-the-art security solution for developers working in every phase of the code-to-cloud lifecycle. But that’s just the “What”—now let’s dive into the “Why” and the “How.”

Data Anonymization: What It Is and 6 Best Practices You Should Know

Despite diverse protection measures applied by organizations, data breaches involving Personally Identifiable Information (PII) still cause substantial financial losses across various industries. Between March 2022 and March 2023, compromised customer and employee PII cost organizations $183 and $181 per record, respectively, according to the 2023 Cost of a Data Breach Report by IBM Security.

DISP: Securing the Australian Defence Supply Chain

The Defence supply chain is a network of interrelated companies, services, and products that transform raw materials and information into goods and expertise for military materiel applications. Given the scale, breadth, and complexity of bringing so many different stakeholders and activities together, the risks that a supply chain presents can be challenging to define and manage.

Decoding Data Security Posture Management - Separating Truth from Myth

Data is expanding beyond environments, applications, and geographical boundaries. It is safe to say that we are currently experiencing the era of the Big Bang of Data. It is driving economies and industries. Organizations that can leverage data to its fullest potential take the helm of their industry, leading it peerlessly. However, with the proliferation of data comes increasingly serious risks to data security and privacy.