Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding shadow AI in your endpoint environment

Generative AI–and large language models in particular–reached mass consumer adoption beginning in late 2022 and early 2023, with ChatGPT reaching 100 million users faster than any consumer application in history. Since then, AI has advanced at a breakneck pace and now seems to be incorporated in every tool, app, and website–regardless of how useful it might actually be.

Ep 38: Wheels up, systems down: cybersecurity at cruising altitude

In this episode of Masters of Data, we buckle up and explore the staggering technological complexity behind the airline industry, from managing IoT devices across global fleets to navigating the data chaos of mergers and acquisitions. We dig into the delicate balance airlines strike between aging legacy systems and risky upgrades, and why getting that wrong isn't just costly but potentially catastrophic. We also look at how forward-thinking airlines are turning operational logs into real business wins, all while safeguarding the mountains of sensitive passenger data they collect every day.

Best Enterprise DLP Tools for AI Data Risk (2026 Comparison)

Employees move sensitive data into AI tools every day. Someone pastes customer records into ChatGPT to draft an email. A developer feeds proprietary source code into a coding assistant to fix a bug. A project manager drops a confidential contract into Gemini to summarize it for a meeting. According to research from Cyberhaven Labs, 39.7% of the data employees share with AI tools is sensitive, and enterprise adoption of endpoint-based AI agents grew 276% in the past year alone.

7 Generative AI Security Risks and How to Defend Your Organization

Generative AI creates new attack surfaces that traditional security tools were not designed to address. The biggest generative AI security risks include prompt injection, data leakage, shadow AI, compliance exposure, model poisoning, insecure RAG pipelines, and broken access control. Each one requires a specific defense, not a generic firewall or DLP rule.

Secure SSO: How Multi-Factor Authentication Strengthens Single Sign-On Security

The most common first move in a modern cyberattack isn't a zero-day exploit or a piece of custom malware. It's a username and a password. Attackers know that credential theft is the fastest path into an enterprise network. And when an organization implements Single Sign-On (SSO), that path gets shorter. One stolen credential equals access to dozens of applications.

5 Major Benefits of Automated User Provisioning for JD Edwards

Managing JD Edwards user access by hand quickly becomes a hardship, especially as your team grows and roles shift constantly. You end up with deprovisioning that drags on for weeks, role assignments that don't match job descriptions, and audit trails scattered across emails and spreadsheets. These aren't one-off problems. They happen predictably when manual processes try to handle enterprise-scale demands in a fast-moving business environment.