Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

AI vs. AI: Why fighting GenAI fraud requires a multi-layered approach

If The Terminator, The Matrix, and every other cyberpunk series taught us anything, it’s that you can’t fight the machines with machines alone. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants.

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale

In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices that appear strikingly authentic. Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies, catching users and security tools off guard.

Unveiling the Cloud's Hidden Risks: How to Gain Control of Your Cloud Environment

In today's rapidly evolving digital landscape, the cloud has become an indispensable tool for businesses seeking agility and scalability. However, this migration also brings a new set of challenges, particularly when it comes to security. The increasing complexity and sophistication of cyber threats demand a proactive and comprehensive approach to safeguarding your cloud environments.

Intelligent Data Classification: Transforming Google Drive Security

Our customers often tell us about how they implement manual classification policies. However, with several hundreds of files created daily, and constant sharing between teams, it becomes impossible to enforce secure sharing and sensitive data protection. Imagine that your sales team just accidentally shared a spreadsheet containing customer credit card details with an external vendor. Or perhaps your HR department stored employee health records in a folder that wasn't properly restricted.

What is Software-as-a-Service (SaaS) Operations?

In this video, learn the following key points about Software-as-a-Service Operations (SaaS Ops): Resources and social media: Transcript: Organizations rely on SaaS applications more and more to get things done. But with so many specialized apps and different vendors, IT departments can get lost in the cloud. It’s easy to see why -- most organizations use over 100 SaaS apps in their day-to-day tasks. For an IT team, that’s a ton to manage.

How to Keep Your CCaaS Solution Secure

A Contact Center as a Service (CCaaS) solution offers your business the flexibility and scalability necessary to manage customer interactions efficiently. However, like most cloud-based systems, your CCaaS platform needs to be successfully secured to protect sensitive information and maintain regulatory compliance-all to ensure the trust of your customers. Ready to secure your CCaaS solution? Here are 7 steps you can take.

Navigating the Future: Cloud Migration Journeys and Data Security

For years, businesses have been chasing innovation with cloud platforms, moving beyond the limitations of legacy technology for greater speed and agility, and sharpening their competitive edge. However, all businesses often face challenges that complicate cloud migration, driving up costs and timelines while exposing the business to data security risks. Ultimately, these challenges block businesses from experiencing the true benefits of cloud integration, and in some cases, lead to significant breaches and regulatory fines.

Introducing Document AI, Persona's AI-powered suite of features for document processing

Accelerate decision-making with AI-powered document processing. Lynn Chou is a product marketer focused on Persona's startups and healthcare customers. She loves afternoon tea, pilates, and taking her cat on walks. Lynn Chou is a product marketer focused on Persona's startups and healthcare customers. She loves afternoon tea, pilates, and taking her cat on walks.

What to look for in Cloud Security

Cloud computing is changing how companies handle their data, providing unparalleled scalability and flexibility. Gartner predicts that by 2025, 85% of businesses will primarily use cloud services. But this change also brings in associated security risks. The 2023 Cloud Security Report by Cybersecurity Insiders found that 93% of companies are concerned about security risks in the cloud. As more businesses move to the cloud, making sure they have good security measures is very important.