#data-security

[ follow ]
fromBusiness Matters
2 days ago

Data Security Posture Management - The Next Big Data Solution Your Business Needs (And How to Get Started)

Data security posture management (DSPM) offers a solution to effectively manage the increasing volume of data, ensuring a unified view and compliance across platforms.
Data science
#compliance
Artificial intelligence
fromZDNET
1 month ago

AI agent adoption is driving increases in opportunities, threats, and IT budgets

Data security is essential for trust and innovation in an AI-driven economy.
Organizations are increasing security budgets to manage evolving threats and compliance complexities.
Artificial intelligence
fromZDNET
1 month ago

AI agent adoption is driving increases in opportunities, threats, and IT budgets

Data security is essential for trust and innovation in an AI-driven economy.
Organizations are increasing security budgets to manage evolving threats and compliance complexities.
#cybersecurity
Privacy professionals
fromTechRadar
1 month ago

Top US dental firm spills over 8 million user files online

A massive unsecured database exposed millions of dental records, stressing the importance of cloud security awareness.
Dental marketing agency may be linked to the unsecured data breach.
Privacy technologies
fromThe Atlantic
1 month ago

The Secrets of the World's Greatest Privacy Experts

Extreme-privacy consultants help individuals make their personal information difficult to find through sophisticated tools and strategies.
Artificial intelligence
fromZDNET
1 month ago

96% of IT pros say AI agents are a security risk, but they're deploying them anyway

Rapid deployment of AI agents within organizations occurs amid significant security concerns.
Most organizations lack proper policies to govern AI agent behavior.
Privacy professionals
fromTechRadar
1 month ago

Top US dental firm spills over 8 million user files online

A massive unsecured database exposed millions of dental records, stressing the importance of cloud security awareness.
Dental marketing agency may be linked to the unsecured data breach.
Privacy technologies
fromThe Atlantic
1 month ago

The Secrets of the World's Greatest Privacy Experts

Extreme-privacy consultants help individuals make their personal information difficult to find through sophisticated tools and strategies.
Artificial intelligence
fromZDNET
1 month ago

96% of IT pros say AI agents are a security risk, but they're deploying them anyway

Rapid deployment of AI agents within organizations occurs amid significant security concerns.
Most organizations lack proper policies to govern AI agent behavior.
#artificial-intelligence
fromZDNET
1 week ago

How proxy servers actually work, and why they're so valuable

A proxy server sits between your computer and a remote computer, acting on behalf of your machine and providing IP address anonymity during transactions.
Privacy technologies
fromInfoWorld
1 week ago

Three steps to boost Amazon S3 data security

Audit identities with SSE-C privileges, remove inactive accounts and unnecessary privileges. This keeps sensitive data safe from unauthorized access and potential breaches.
Privacy professionals
#data-breach
Privacy professionals
fromThe Verge
1 month ago

LexisNexis leaked social security numbers and other personal data for over 364,000 people

LexisNexis suffered a breach exposing sensitive personal information of over 364,000 individuals via unauthorized access.
fromDatabreaches
1 week ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

Privacy professionals
fromThe Verge
1 month ago

LexisNexis leaked social security numbers and other personal data for over 364,000 people

LexisNexis suffered a breach exposing sensitive personal information of over 364,000 individuals via unauthorized access.
fromDatabreaches
1 week ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

#privacy
Privacy technologies
fromArs Technica
1 month ago

"Microsoft has simply given us no other option," Signal says as it blocks Windows Recall

The Recall feature raises significant privacy concerns by indexing users' sensitive information without consent.
Privacy technologies
fromArs Technica
1 month ago

"Microsoft has simply given us no other option," Signal says as it blocks Windows Recall

The Recall feature raises significant privacy concerns by indexing users' sensitive information without consent.
fromForbes
1 week ago

19 Common IT Inventory Mistakes In Remote Workplaces

"Without tokenized IDs linked to each device, IT teams lack real-time visibility, leading to lost assets and security risks, especially with remote teams."
Remote teams
fromwww.housingwire.com
1 week ago

Reducing risk: Safely disposing of old electronics

E-waste contains hazardous substances that pose serious threats to the environment and public health if discarded improperly.
Real estate
#ai
fromZDNET
1 month ago
Artificial intelligence

Red Hat Summit 2025 goes beyond the hype, towards practical AI

fromBusiness Insider
1 week ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

fromZDNET
1 month ago
Artificial intelligence

Red Hat Summit 2025 goes beyond the hype, towards practical AI

fromBusiness Insider
1 week ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

fromDevOps.com
1 week ago

App Migration: How to Build a Winning Risk Management Plan - DevOps.com

Due to various reasons (human error, data incompatibility, etc.), some corporate data can be corrupted or lost during the migration process, which can lead to operational disruptions.
Software development
fromTheregister
1 week ago

Glasgow council yanks services offline amid attack cleanup

The council's ICT supplier CGI discovered malicious activity on servers managed by a third-party supplier, leading to widespread disruption of digital services.
London politics
fromTechzine Global
2 weeks ago

Thales covers data security entirety thanks to Imperva

"Thales had strong hardware security modules and data encryption solutions, but more is needed," explains Steven Maas, highlighting the necessity for comprehensive data security solutions.
Information security
#ai-technology
#ai-integration
fromMarTech
1 month ago
Marketing tech

HubSpot's ChatGPT connector generates excitement and some concerns | MarTech

fromMarTech
1 month ago
Marketing tech

HubSpot's ChatGPT connector generates excitement and some concerns | MarTech

#tiktok
EU data protection
fromIrish Independent
1 month ago

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
EU data protection
fromIrish Independent
1 month ago

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
fromTheregister
3 weeks ago

Microsoft brings 365 suite on-prem as part of sovereign push

Microsoft 365 Local enables customers to deploy Microsoft productivity workloads like Exchange Server and SharePoint Server in their own datacenters or sovereign cloud environments - with full control on security, compliance and governance.
European startups
fromwww.npr.org
3 weeks ago

Top House Democrat asks Microsoft about DOGE code allegedly tied to NLRB data removal

Rep. Stephen Lynch has expressed serious concerns regarding potential data obfuscation efforts by the DOGE team, which may have involved deleting logs and sending large data sets out of the NLRB system.
US news
fromAlleywatch
3 weeks ago

#NYCtech Week in Review: 6/8/25 - 6/14/25

Farsight AI has secured $16M in Series A funding to enhance workflow automation solutions specifically tailored for the financial services sector, showcasing significant investor confidence.
NYC startup
#digital-sovereignty
European startups
fromHackernoon
1 month ago

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
fromZDNET
3 weeks ago
Germany news

Yet another European government is ditching Microsoft for Linux - here's why

European startups
fromHackernoon
1 month ago

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
fromZDNET
3 weeks ago
Germany news

Yet another European government is ditching Microsoft for Linux - here's why

#fca
Marketing tech
fromComputerworld
3 weeks ago

Salesforce changes Slack API terms to block bulk data access for LLMs

Slack has changed its API terms to prohibit LLM training on its data, impacting data discovery efforts across organizations.
fromWIRED
3 weeks ago

Senators Warn DOGE's Social Security Administration Work Could Break Benefits

Put simply, DOGE has already limited access to benefits by damaging SSA's technological infrastructure-and this rushed IT modernization plan can only exacerbate those problems.
SF politics
#cyber-attack
London startup
fromwww.bbc.com
1 month ago

M&S website completely down, leaving users unable to browse

M&S is currently experiencing significant disruptions due to a cyber-attack, which has impacted online services and projected profits.
London startup
fromwww.bbc.com
1 month ago

M&S website completely down, leaving users unable to browse

M&S is currently experiencing significant disruptions due to a cyber-attack, which has impacted online services and projected profits.
#insider-threats
fromAmazon Web Services
4 weeks ago

How Kepler democratized AI access and enhanced client services with Amazon Q Business | Amazon Web Services

Our commitment to clarity and security drives our operations, taking inspiration from Johannes Kepler to illuminate the path for our Fortune 500 clients.
Marketing tech
fromTheregister
1 month ago
Artificial intelligence

Schneier to House: AI fawning obscures security concerns

Bruce Schneier highlights risks of AI in government, warning against negligence in data handling by DOGE and public enthusiasm for AI technology.
#generative-ai
fromThe Hacker News
1 month ago
Artificial intelligence

Empower Users and Protect Against GenAI Data Loss

Blocking access to generative AI tools isn't a sustainable solution; it drives usage underground and creates risks organizations can't ignore.
fromComputerWeekly.com
1 month ago
Artificial intelligence

CISOs: Don't block AI, but adopt it with eyes wide open | Computer Weekly

Adopting generative AI requires careful risk assessment and policy alignment to avoid potential pitfalls.
Digital life
fromTechzine Global
1 month ago

Data Lifecycle Management: The Overlooked Step of Secure Deletion

Data Lifecycle Management is essential for safeguarding sensitive information throughout its lifecycle, particularly during secure deletion.
Privacy professionals
fromInfoQ
1 month ago

Have I Been Pwned 2.0 Adds New Tools for Data Breach Monitoring

Have I Been Pwned introduces a redesigned front-end to enhance user experience and address evolving needs for improved breach monitoring.
#microsoft
fromNon Profit News | Nonprofit Quarterly
1 month ago
Non-profit organizations

Microsoft Axes Free 365 Software for Nonprofits - Non Profit News | Nonprofit Quarterly

Microsoft is ending free software access for nonprofits, requiring quick adaptation or risk losing data.
fromDatabreaches
1 month ago
Digital life

Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool

Microsoft disrupts Lumma Stealer to combat cybercrime.
Legal action leads to significant seizure of malicious domains.
Digital life
fromDatabreaches
1 month ago

Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool

Microsoft disrupts Lumma Stealer to combat cybercrime.
Legal action leads to significant seizure of malicious domains.
#cloud-computing
European startups
fromTheregister
1 month ago

Europe escaping clutches of US hyperscalers near

Europe faces significant challenges in reducing dependence on American cloud services due to insufficient datacenter capacity.
fromDatabreaches
1 month ago

MSCS board renews contract with PowerSchool while suing them

Despite the ongoing lawsuit, Memphis-Shelby County Schools board decided to renew a multi-million dollar contract with PowerSchool, highlighting a focus on future security management.
SF parents
fromChannelPro
1 month ago

TD Synnex named as UK distributor for Cohesity

TD Synnex has been announced as the UK distributor for Cohesity, providing partners access to its AI-powered data security and management tools.
European startups
Privacy technologies
fromDatabreaches
1 month ago

FTC Finalizes Order with GoDaddy over Data Security Failures

GoDaddy misled consumers about its data security protections, leading to significant data breaches and a settlement with the FTC.
fromZDNET
1 month ago

The Samsung T5 Evo 4TB portable SSD is back in stock and $95 off

Samsung's portable SSD deal, priced at $230 and bundled with a free 256GB microSDXC card, offers an excellent storage solution for various digital needs.
Digital life
US news
fromDatabreaches
1 month ago

Hacker who breached communications app used by Trump aide stole data from across US government

A hacker breached a communication service used by Mike Waltz, impacting over 60 government officials and raising data security concerns.
The scope of the breach is extensive, involving messages from various U.S. officials.
#ai-services
fromHackernoon
1 year ago

Your Kubernetes Secrets Are Basically Public Without a KMS | HackerNoon

Kubernetes Secrets provide a mechanism to store sensitive information, separating it from application logic, ensuring that confidential data is managed securely.
Information security
Digital life
fromHackernoon
8 months ago

Data Grim Reaper: The Truth About Securely Wiping Your Digital Life | HackerNoon

Using standard delete functions is not sufficient to remove files permanently; specialized tools like diskEraser are necessary for thorough data destruction.
[ Load more ]