Cybersecurity principles are simple, says Databricks' Field CISO. The hard part is doing them at scale across thousands of users and hundreds of applications. The company thinks its data platform – ...
Over the weekend, security experts were beginning to panic. MITRE announced that the US government had not renewed funding for the Common Vulnerabilities and Exposures (CVE) database. MITRE VP Yosry ...
Earlier this month, the now viral social network Moltbook exposed 1.5 million API authentication tokens and 35,000 email addresses within days of launch. The cause: a single misconfigured database ...
All Delaware insurers must submit annual compliance certification by February 15 under the state’s Insurance Data Security Act ...
In a sign of how pervasive data sharing has become, businesses may face challenges complying with a new government rule restricting data use outside the US. The US Department of Justice's (DoJ) Data ...
Data protection startup Gambit Security Ltd. launched today with $61 million in funding from Spark Capital, Kleiner Perkins ...
The cybersecurity industry has turned data lineage into another buzzword, with vendors promising complete data visibility that will solve all data protection challenges. This marketing transforms a ...
Every few years, the cybersecurity industry invents a new acronym to keep pace with innovation. We’ve seen Cloud Security Posture Management (CSPM) and Data Security Posture Management (DSPM). Now, as ...
Despite fresh tweaks to Turkey’s cybersecurity infrastructure, mass data breaches continue. No surprise, say experts, when policy is not implemented and the security culture goes unchallenged. In ...
Every form of artificial intelligence is fueled by data. Some of that data is highly sensitive or personal, and much of it is proprietary. That’s why organizations adopting AI must ensure their data ...
Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.