Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

Breaking it Down: A Data-Centric Security Perspective on NIST Cybersecurity Framework 2.0

| | Data Security, NIST
On February 26, 2024, NIST released version 2.0 of the Cybersecurity Framework. This blog reviews the fundamental changes introduced in CSF 2.0 and data-centric security considerations that should be made when aligning ...
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard
How No/Low Code CIAM Balances Security and User Engagement?

How No/Low Code CIAM Balances Security and User Engagement?

Discover the revolutionary No/Low Code CIAM world, where robust security meets seamless user engagement. Learn why developers are turning to this solution, explore real-world use cases, and see how LoginRadius is leading ...
NetApp data broker FTC location data

NetApp Leverages AI to Make File System Ransomware Resistant

NetApp embedded artificial intelligence capabilities in its ONTAP file system that can identify ransomware threats in real time ...
Security Boulevard
Navigating the Waters of Generative AI

Navigating the Waters of Generative AI

| | AI, Data Security, generative AI
Part I: The Good and the Bad of AI Few would argue that 2023 was the year AI, specifically generative AI (Gen AI) like ChatGPT, was discussed everywhere. In October, Forrester published ...
Microsoft AI cybersecurity

The xSPM Trend: Security Posture Management for Everything

The xSPM trend represents a holistic approach to managing and enhancing the security posture of diverse IT assets ...
Security Boulevard
Verizon 2023 Data Breach Investigations

Healthcare Needs Risk-Based Cybersecurity for Comprehensive, Effective Protection

| | Data Security
In the first blog post of this three-blog series, we discussed the extraordinarily powerful “perfect storm” of cyber risk faced by healthcare organizations. The second blog post reviews how data security risks ...
CNAPP cloud security palo alto networks Deloitte Broadcom report cloud security threat

Organizations Unprepared to Face Cloud Security Threats

The Cloud Security Alliance (CSA) State of Security Remediation report underscored the difficult balancing act cloud security experts face ...
Security Boulevard
FTC privacy data game baseball

TEGWAR, AI and the FTC – Gov’t Agency Warns of Deceptive AI Contract Language

Data collection and use policies need to be reexamined because of AI. The FTC is trying to address the issue ...
Security Boulevard
CTO NTT Attivo Networks AD Red Forest, or Well-Managed Active Directory

3 Ways the CTO Can Fortify the Organization in the Age of Generative AI

Most enterprises testing the generative AI waters primarily lean on their CISOs and general counsel. But the CTO should be involved, too ...
Security Boulevard