DEF CON 32 - Sneaky Extensions  The MV3 Escape Artists - Vivek Ramachandran, Shourya Pratap Singh

Browser Extensions: The Infostealers Nobody is Watching Out For

Extension-Based Infostealers and How to Stop ThemInfostealers have become a critical security threat, capable of exfiltrating valuable data including credentials, intellectual property, personal information, and financial records. Currently, two primary categories are well-documented: ...
Unique Data Loss Challenges in the Browser

Unique Data Loss Challenges in the Browser

In today’s digital age, data is a company’s most valuable asset. A single instance of data loss can lead to severe consequences, from hefty fines for violating data privacy laws like GDPR ...
Fortinet, platform, SSE NIST DLP Systems and the Solutions They Offer

Fortinet Adds Data Loss Prevention Capability Following Acquisition of Next DLP

Fortinet has added a data loss prevention (DLP) platform to its portfolio that is based on the technology it gained with the acquisition of Next DLP earlier this year ...
Security Boulevard
K-12 Google & Microsoft 365 Data Loss Prevention using Cloud Monitor by ManagedMethods

K-12 Google & Microsoft 365 Data Loss Prevention using Cloud Monitor by ManagedMethods

Far too often, we hear about schools facing cybersecurity crises because of a simple human error like sharing sensitive student information in an email, like Social Security numbers, outside the district’s cloud ...
AI; cybersecurity, DeepSeek, LLM, LLMs, attacks, multi-agent, Cybersecurity, AI, security, risk, Google AI LLM vulnerability

How LLMs are Revolutionizing Data Loss Prevention

As data protection laws take hold across the world and the consequences of data loss become more severe, let’s take a closer look at the transformative potential that LLMs bring to the ...
Security Boulevard
[FREE] Google Workspace and/or Microsoft 365 Security & Safety Audit. Learn More & Claim >>

5 ways to improve your school’s cyberattack preparedness

Most people know that cyberattacks are a significant threat, impacting daily the financial, operational, and reputation states of companies of all sizes and industries. What many don’t know is that the education ...
Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil

Survey Surfaces Willingness to Switch Data Protection Platforms

A Veeam survey found 54% of respondents planned to change their primary backup solution compared to 27% who wouldn't switch ...
Security Boulevard
data exfiltration, threat, inside-out, breach, security strategy, data breaches, data search, Exabeam, data, data breaches, clinical trials, breach, breaches, data, residency, sovereignty, data, breaches, data breaches, NetApp data broker FTC location data

Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security

DLP plays an important role, but it's not the only necessary component in a robust data protection strategy ...
Security Boulevard

Atlassian Confluence Data Wiping Alert

In today’s digital landscape, ensuring the security and integrity of your data is paramount. Atlassian, a prominent software company, recently issued a crucial advisory regarding Confluence, a popular collaboration and document management ...
Is Someone Stealing Your Code? How to Lock Down Intellectual Property

Is Someone Stealing Your Code? How to Lock Down Intellectual Property

Ensuring the robust protection of intellectual property is crucial for enterprises striving to retain their competitiveness ...
Security Boulevard