
Applications » Security
Features
Cars: The Next Data Privacy Battleground
Don’t look now, but your car may be spying on you. Unless you drive a pre-digital model, your car’s maker is likely collecting all kinds of data about you, including your race, your driver’s license numbers, how fa Read more…
You Can Now Query Encrypted Data, MongoDB Says
MongoDB yesterday officially rolled out Queryable Encryption, a new offering that enables users to query data while it’s encrypted in the database. While the technology isn’t a silver bullet for security, it could si Read more…
The Business Case for Privacy Enhancing Technologies
In a world that’s constantly hyping the next big thing, it’s natural to be wary when a family of technologies is described as transformational. This label has been recently associated with Privacy Enhancing Technolog Read more…
Meet Raluca Ada Popa, a 2023 Datanami Person to Watch
The ready availability of cloud computing on the one hand and the explosion of data on the other has thrust data security into the limelight as it has never been before. One of the world's foremost experts in applied cry Read more…
Security Risks of Gen AI Raise Eyebrows
Unless you’ve been hiding under a rock the past eight months, you’ve undoubtedly heard how large language models (LLMs) and generative AI will change everything. Businesses are eagerly adopting things like ChatGPT to Read more…
News In Brief
New AWS Service Lets Businesses Upload Data to Cloud From Secure Terminals
Amazon Web Services (AWS) is introducing a new feature that allows customers to schedule time slots at designated physical locations to connect their storage devices and upload data to AWS cloud. The AWS Data Transf Read more…
Google’s New AI Tool Uncovers Critical Zero-Day Vulnerability in SQLite
As cyber threats grow more sophisticated, the need for innovative tools to enhance vulnerability detection has never been greater. Cybersecurity companies like Palo Alto, Fortinet, and CrowdStrike have responded by incor Read more…
Homomorphic Encryption Library Open Sourced by Apple
Apple recently open sourced its homomorphic encryption library for Swift, enabling developers who use the Apple programming language to implement the privacy-preserving technology. Homomorphic encryption (HE) is a rel Read more…
CSA Report Reveals AI’s Potential for Enhancing Offensive Security
The rise of AI, including large language models (LLMs) and AI-powered agents, has dramatically reshaped the field of offensive security - a branch of cybersecurity focused on proactively identifying and exploiting securi Read more…
Cloud Security Alliance Introduces Comprehensive AI Model Risk Management Framework
The Cloud Security Alliance (CSA), an organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, released a new paper that offers guidelines for the re Read more…
This Just In
BOZEMAN, Mont., April 10, 2025 — Snowflake today announced it has achieved Department of Defense (DOD) Impact Level 5 (IL5) Provisional Authorization (PA) on AWS GovCloud US-West. This authorization enables Snowflake to offer IL5 authorized solutions to organizations requiring the highest levels of protection for Controlled Unclassified Information (CUI) within the DOD and related agencies. Read more…
SANTA CLARA, Calif., April 4, 2025 — Cohesity has announced it is the first data protection provider to achieve Nutanix Database Service (NDB) database protection Nutanix Ready validation. Read more…
AUSTIN, Texas, April 1, 2025 — ControlTheory today announced it has raised $5 million in seed funding from Silverton Partners, an Austin-based venture capital firm. This milestone supports the launch of its innovative Observability Control Platform, enabling technology leaders to regain control of their observability through cost control, operational control, and adaptive control. Read more…
SANTA CLARA, Calif., April 1, 2025 — Hitachi Vantara, the data storage, infrastructure, and hybrid cloud management subsidiary of Hitachi, Ltd., announced that its hybrid cloud portfolio has achieved alignment with the U.S. Read more…
PARSIPPANY, N.J., March 24, 2025 — As fraudsters continue to exploit any weaknesses in financial services systems, financial institutions must stay ahead of fraud threats, necessitating an integrated approach to risk decisioning across both fraud prevention and credit risk use cases. Read more…