DSPM

Proofpoint Leverages AI to Extend Scope of Cybersecurity Reach
Proofpoint has expanded its ability to thwart multistage cyberattacks spanning multiple communications channels while at the same time extending its reach into data security posture management (DSPM) ...
Security Boulevard
From Data to Cloud: Bridging Security Gaps with DSPM and CSPM
Over the past few years, businesses have rapidly expanded their digital infrastructure to accommodate distributed workforces and implemented a slew of modernization initiatives to bring them into the digital era. This has ...

CHOROLOGY.ai Extends AI Reach to Classify Sensitive Data
CHOROLOGY.ai this week added an Automated Compliance Engine (ACE) to its data security posture management (DSPM) platform that makes use of multiple types of artificial intelligence (AI) to rapidly classify sensitive data ...
Security Boulevard

DSPM: A Cybersecurity Approach Tailor-Made for This AI Era
As AI adoption grows, so does organizations’ appetite for the vast data from disparate sources needed to train AI models. Because of this, companies are grappling with how to safeguard a surging ...
Security Boulevard
Data Security Posture Management Should Focus on Securing the Data
Organizations use and store many types of data. Some of it is high value containing business-critical information or regulated data, such as PII (personally identifiable information). Other data is less sensitive and ...

Eureka Security Extends DSPM Reach to File Sharing Services
Michael Vizard | | Cloud Security, Data Security, DSPM, Eureka Security, file sharing, posture management
Eureka Security extended the reach of its DSPM platform to protect documents such as spreadsheets stored in file-sharing services ...
Security Boulevard

Black Hat: Amer Deeba, Normalyze.ai
Alan Shimel: Hi everyone. We’re back here on Thursday in Las Vegas for Black Hat. Thursday of Black Hat week is always an interesting day because a lot of the people are ...
Security Boulevard
What Is Cloud Data Security?
Dave Stuart | | CDAC, cloud data access control, cloud data security, cloud data security strategy, Cloud Security, cloud-native data security, data access control, data accessibility, data detection, data detection and response, data protection, Data Security, Data Security Posture Management, DDR, DSPM, multi-cloud data security platform
Shifting to the cloud is a necessary step for today’s businesses to get and stay … The post What Is Cloud Data Security? appeared first on Laminar ...
Black Hat USA 2023: The Ultimate Survival Guide
Karen Sung | | building cyber resilience, cloud data cyber revolution, cloud data lakes, cloud data security, cloud migrations, Cloud Security, cyber programs, Cybersecurity, cybersecurity programs, Cybersecurity Strategy, cybersecurity technology, data security solution, DSPM, forensic evidence collection, gamification, Industry, latest cybersecurity trends, outcomes based security services, RSA Conference 2023, RSAC survival guide, secure cloud migration, technology
Can you believe it? Black Hat USA is back for its 26th year, bringing together … The post Black Hat USA 2023: The Ultimate Survival Guide appeared first on Laminar ...

IBM Acquires Polar Security for Data Security Posture Management
IBM this week acquired Polar Security to add a data security posture management platform to its cybersecurity portfolio. Kevin Skapinetz, vice president of strategy and product management for IBM Security, said the ...
Security Boulevard