Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Hidden Data Exfiltration Using Time, Literally

I was looking at my watch last week and my attention was moved towards the seconds over at the right of the watch face, incrementing nicely along as you’d expect. Now, I don’t know if I’d just spent too long staring at a debugger screen or if it was something in the air, but an idea dawned on me, related to all things command and control, data exfiltration, etc.

Nightfall AI and Snyk Partner to Offer Developers AI-Powered Secrets Scanning

SAN FRANCISCO, Oct. 12, 2023—Nightfall AI, the leader in cloud Data Leak Prevention (cloud DLP), today announced a partnership with Snyk, a leading developer security provider, to offer developers AI-powered secrets-scanning capabilities. Snyk and Nightfall are partnering to co-sell Nightfall's DLP platform alongside Snyk's Developer Security Platform.

Nightfall Partnered with Snyk to Make Developers' Lives Easier. Here's How.

As we announced earlier today, Nightfall is thrilled to team up with Snyk to provide a state-of-the-art security solution for developers working in every phase of the code-to-cloud lifecycle. But that’s just the “What”—now let’s dive into the “Why” and the “How.”

Data Anonymization: What It Is and 6 Best Practices You Should Know

Despite diverse protection measures applied by organizations, data breaches involving Personally Identifiable Information (PII) still cause substantial financial losses across various industries. Between March 2022 and March 2023, compromised customer and employee PII cost organizations $183 and $181 per record, respectively, according to the 2023 Cost of a Data Breach Report by IBM Security.

DISP: Securing the Australian Defence Supply Chain

The Defence supply chain is a network of interrelated companies, services, and products that transform raw materials and information into goods and expertise for military materiel applications. Given the scale, breadth, and complexity of bringing so many different stakeholders and activities together, the risks that a supply chain presents can be challenging to define and manage.

Decoding Data Security Posture Management - Separating Truth from Myth

Data is expanding beyond environments, applications, and geographical boundaries. It is safe to say that we are currently experiencing the era of the Big Bang of Data. It is driving economies and industries. Organizations that can leverage data to its fullest potential take the helm of their industry, leading it peerlessly. However, with the proliferation of data comes increasingly serious risks to data security and privacy.

Microsoft 365 GCC High Guide for DoD Contractors

In today’s rapidly evolving cyber threat landscape, organizations, particularly those within the public sector and defense industries, face unprecedented challenges in securing sensitive data and ensuring regulatory compliance. The need for a comprehensive, cloud-based productivity and collaboration suite that empowers teams and meets stringent security and compliance requirements has never been greater.

AI Development Tools that Security Teams Should Know About and How to Secure Them

Following the rush to Artificial Intelligence (AI), many companies have introduced new tools and services to the software supply chain. Some of today’s most popular AI development tools include: This assortment of tools can be used to develop a wide range of AI applications, such as chatbots, virtual assistants, and image recognition systems.

Revolutionizing big data management: Unveiling the power of Amazon EMR and Elastic integration

In the dynamic realm of data processing, Amazon EMR takes center stage as an AWS-provided big data service, offering a cost-effective conduit for running Apache Spark and a plethora of other open-source applications. While the capabilities of EMR are impressive, the art of vigilant monitoring holds the key to unlocking its full potential. This blog post explains the pivotal role of monitoring Amazon EMR clusters, accentuating the transformative integration with Elastic®.