data
Looking Toward U.S. Federal Privacy Regulation, How Software Companies can Prepare
Software developers, as key players in the digital ecosystem, must proactively adapt to these changes to ensure compliance and uphold the privacy rights of users ...
Security Boulevard
Snyk Allies With Snowflake to Improve Data Security
Snyk and Snowflake have allied to make it simpler for cybersecurity teams to analyze the security posture of their IT environments using data hosted in the cloud ...
Security Boulevard
Missing Guardrails, a Troubling Trend in Data Protection
An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks ...
Security Boulevard
Survey Surfaces Widespread Mishandling of Sensitive Data
Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business ...
Security Boulevard
DSPM: A Cybersecurity Approach Tailor-Made for This AI Era
As AI adoption grows, so does organizations’ appetite for the vast data from disparate sources needed to train AI models. Because of this, companies are grappling with how to safeguard a surging ...
Security Boulevard
Survey Finds Confidence in Data Security Despite Ransomware Scourge
A survey of 322 IT and security professionals finds nearly two-thirds (63%) have confidence in the effectiveness of their organization’s data security measures with another 30% uncertain despite the volume of breaches ...
Security Boulevard
Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
Tom Eston | | arrest, Cyber Security, Cybersecurity, data, Data Privacy, Delete My Data, Detroit, Detroit Police, Digital Forensics, Digital Privacy, Episodes, Exploit, facial recognition, hard drive, HDD, Information Security, Infosec, Old Computer, Old PC, openssh, personal data, Podcast, Podcasts, Privacy, Qualys, RegreSSHion, Secure Wipe, security, SSH, technology, vulnerability, Weekly Edition, zero-day
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
The Value of HR in Your Insider Risk Management Program
Christopher Burgess | | data, Dtex Systems, employee behavior, HR, human sensor, Insider Risk Management, irm program trust
Companies hire people, and while every one of those individuals presents a potential risk, not all (hopefully none) will manifest as an insider threat to the company. As a human challenge, one ...
Criminals are Easily Bypassing Passkeys – How Organizations Can Stay Safe
The problems with passwords drive the interest to adopt newer authentication methods, like passkeys, a type of passwordless technology ...
Security Boulevard
Sysdig Extends CNAPP Reach to AI Workloads
The goal is to enable cybersecurity and data science teams to work together and share their expertise ...
Security Boulevard