Applications » Security
Features
Weighing Your Data Security Options for GenAI
No computer can be made completely secure unless it’s buried under six feet of concrete. However, with enough forethought into developing a layered security architecture, data can be secured enough for Fortune 500 ente Read more…
Online Privacy in the Age of Data Brokers
The Biden administration's recent executive order on restricting the transfer of sensitive personal data to "countries of concern" is likely the opening of much stricter privacy regulations in general, and data brokers i Read more…
Using AI to Keep Scammers and Fraudsters (a Little More) Honest
Fraudsters and scammers have had a good run lately according to the FTC, which found Americans lost $10 billion to frauds and scams in 2023, a 14% increase over the year before. But victims and law enforcement are fighti Read more…
Buckle Up: It’s Time for 2024 Security Predictions
It doesn’t take a prophet to know that computer security will be in the news in 2024, and probably not in a good way. What we don’t know are the particulars of how cybercriminals will be trying to penetrate defenses Read more…
Five AWS Predictions as re:Invent 2023 Kicks Off
The computing world this week turns to Amazon Web Services, the company that originally defined the public cloud space and continues to enjoy the largest slice of the cloud pie. Its annual re:Invent conference, which kic Read more…
News In Brief
New AWS Service Lets Businesses Upload Data to Cloud From Secure Terminals
Amazon Web Services (AWS) is introducing a new feature that allows customers to schedule time slots at designated physical locations to connect their storage devices and upload data to AWS cloud. The AWS Data Transf Read more…
Google’s New AI Tool Uncovers Critical Zero-Day Vulnerability in SQLite
As cyber threats grow more sophisticated, the need for innovative tools to enhance vulnerability detection has never been greater. Cybersecurity companies like Palo Alto, Fortinet, and CrowdStrike have responded by incor Read more…
Homomorphic Encryption Library Open Sourced by Apple
Apple recently open sourced its homomorphic encryption library for Swift, enabling developers who use the Apple programming language to implement the privacy-preserving technology. Homomorphic encryption (HE) is a rel Read more…
CSA Report Reveals AI’s Potential for Enhancing Offensive Security
The rise of AI, including large language models (LLMs) and AI-powered agents, has dramatically reshaped the field of offensive security - a branch of cybersecurity focused on proactively identifying and exploiting securi Read more…
Cloud Security Alliance Introduces Comprehensive AI Model Risk Management Framework
The Cloud Security Alliance (CSA), an organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, released a new paper that offers guidelines for the re Read more…
This Just In
SAN FRANCISCO, Dec. 3, 2024 — Elastic today announced Elastic Security now offers expanded cloud detection and response (CDR) capabilities from a single SIEM to reduce tool fragmentation and streamline cloud security. Read more…
Thales Unveils Data Risk Intelligence to Redefine Data Risk Visibility and Proactive Risk Mitigation
MEUDON, France, Dec. 3, 2024 — Thales today announced the launch of Data Risk Intelligence, an Imperva Data Security Fabric (DSF) solution that proactively addresses the risks to data wherever it resides. Read more…
BOSTON, Dec. 3, 2024 — Immuta, a data security company, announced today its support for Amazon Web Services (AWS) Lake Formation, a managed service that makes it easier to centrally govern, secure, and globally share data for analytics and machine learning. Read more…
NEW YORK, Dec. 3, 2024 — Varonis Systems, Inc. today announced it expanded its data security coverage to Databricks. The latest integration broadens Varonis’ extensive coverage to continuously discover and classify critical data, remove exposures, and detect threats to the Databricks Data Intelligence Platform. Read more…
NEW YORK, Dec. 3, 2024 — BigID today announced the launch of Data Activity Monitoring. As the first and only Data Security Posture Management (DSPM) provider to offer near real-time monitoring of suspicious or malicious user activity across both structured and unstructured data, BigID empowers organizations to proactively identify risks, respond faster to potential threats, and help strengthen regulatory compliance. Read more…