Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Data Security including privacy, protection, and encryption.

Small Devices, Big Risk: USB Drives Threaten Enterprise Security

As cloud applications, SaaS platforms, and GenAI tools shape most modern workflows, one physical channel presents an ongoing risk: removable media. USB drives, external devices, and other portable storage remain some of the easiest ways for sensitive data to leave an organization and some of the quietest ways for threats to enter it.

New Databricks and Snowflake apps strengthen cloud data security and data pipeline visibility

If you’re like most companies we work with, you’re awash in opportunities (and a bit overwhelmed with pressure) to adopt AI. Of course, integrating new technologies means more data to manage and systems to monitor.

Cyberhaven Product Launch: Uniting DSPM & DLP to Secure Data in the AI Era

AI is rewriting data risk. On Feb 3, see how to fight back. Every week, AI makes your team faster—and your data more exposed. Files jump between new tools, models train on sensitive inputs, and traditional DLP is blind to the context that matters most. On February 3 at 11:00 AM PST, we’re pulling back the curtain on Cyberhaven’s unified DSPM & DLP platform—and showing how a single, AI‑native platform can finally keep up with how data actually moves.

Security Embedded In Your Data #Protegrity #datasecurity #cybersecurity #datacentric

Move beyond outdated security models that focus on protecting data infrastructure rather than the data itself. By embedding protection that travels with the data, you create a deterministic environment where data knows its own purpose and enables innovation at scale. Visit Protegrity.com to learn more.

Why Protecto Privacy Vault Is Ideal for Masking Structured Data

Picture this. You’re a data engineer at a healthcare company with millions of patient records in Snowflake. HIPAA requires you to protect PII before sharing data with researchers or running analytics. So you tokenize the data. And your system catches fire. Your joins break. Your ETL pipelines fail. BI dashboards return wrong results. ML model training jobs crash. All because something fundamental changed about your data architecture.

2025 Compliance Changes Review - What Organizations Must Know

The regulatory and compliance landscape evolved rapidly in 2025, with changes key changes affecting cybersecurity, privacy, and protective security. This review breaks down key compliance changes, offering insights into new requirements and how to ensure compliance in 2026.

Discovery And Protection of Your Data

In this video, Dan Johnson walks through the core data protection capabilities of the Protegrity AI Developer Edition. We transition from simple data discovery and redaction to more advanced workflows: protecting, unprotecting, encrypting, and decrypting sensitive PII (Personally Identifiable Information). What You’ll Learn: Timestamps: - Exploring the Help command and parameter options Resources.

The Right Business Outcomes #Protegrity #cybersecurity #datacentric #ai #datasecurity

We are at an inflection point where AI, compliance, and quantum are exposing the dangerous fragility of traditional "envelope" security. The organizations that thrive in the next decade will be those that set their data free by embedding deterministic protection directly into the data itself. The organizations that lead the next decade won't just have better AI, they'll have better data security. Visit Protegrity.com to learn more.

How to Stop Sensitive Documents From Leaking in Slack, Gmail, and ChatGPT (Demo)

Your security tools can detect credit card numbers, but they are blind to the files that actually matter. In this demo, we show how sensitive documents like: Internal source code Financial forecasts Performance reviews Customer lists are automatically detected and blocked in Slack, Google Drive, SharePoint, Gmail, and even ChatGPT using Nightfall’s new AI-powered file classifiers. No regex. No keywords. No training data.

Top 5 2026-Ready Data Masking Solutions for Regulated Industries

In regulated industries, organizations are dealing with more sensitive data than ever before. This includes consumer IDs, financial and health-related data, and even behavioral insights. However, when this sensitive data finds its way into test, analytic, or development environments, it poses a direct compliance and security threat. This is where data masking comes in. It enables the use of realistic data by removing or modifying personal identifiers.