Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Security

The latest News and Information on Data Security including privacy, protection, and encryption.

Improve Content Accessibility and Control Sprawl with Egnyte's File and Folder Shortcuts

Given the growth of hybrid work models, organizations are becoming increasingly decentralized. Employees operating from diverse locations access business information through various cloud tools and digital devices.

What does a modern code security pipeline look like? (Hint: not like a pipeline).

What does a good DevSecOps pipeline should look like from a code security perspective? We hear this question often, and even though there are multiple answers, we’ve put together a blueprint that everybody could easily start with.

Improve the Use of Your Data with End-to-End Data Protection Solutions | Protegrity Data Protection

Welcome to the new age of data usage. Start utilizing your data to its full potential while maintaining compliance and end-to-end protection. More from Protegrity: For over 15 years, Protegrity has set the standard in precision data protection, helping enterprises secure and use a perpetually growing store of sensitive data. Through granular protection and intelligent role-based empowerment, Protegrity helps companies focus on growth, development, and optimization.

Consent Phishing Mystery

Janice was notified of an unauthorized $10,000 transfer from her account. Which of her co-workers is behind this nefarious attack? And how did they gain access to her personal data? Find out in this silent mystery. Learn more about Security Awareness and how it can prepare your employees to recognize and neutralize social engineering attacks and human error.

Do You Use ChatGPT at Work? These are the 4 Kinds of Hacks You Need to Know About.

From ChatGPT to DALL-E to Grammarly, there are countless ways to leverage generative AI (GenAI) to simplify everyday life. Whether you’re looking to cut down on busywork, create stunning visual content, or compose impeccable emails, GenAI’s got you covered—however, it’s vital to keep a close eye on your sensitive data at all times.

Overcoming US Regulatory Compliance Challenges with Borderless Data

In today’s age of rapidly increasing data collection, data privacy laws are becoming more prevalent than ever. The EU’s General Data Protection Regulation (GDPR) is considered the worldwide benchmark of data privacy law. While many countries have followed similar regulations, the United States does not have a GDPR equivalent. Instead of national standards and regulations, individual states pass their own privacy laws.

Moody's Analytics Uses Protegrity Pseudonymization to Protect CID Data

The data protection landscape is changing. The rapid adoption of cloud and software as a service (SaaS) greatly affects the financial industry, where many institutions rely on SaaS vendors for data protection previously implemented in-house. Moody’s Analytics relies on cloud service providers (CSPs) to adequately protect its data, showcasing the need for scalability, industry cost controls, and flexibility.