Product spotlight: Year in review

Product spotlight: Year in review

A wide-variety of products have been released this year, especially surrounding artificial intelligence (AI). Security magazine highlights some of the products that have been released in 2024. ExtraHop Reduce Cyber Risk Within Your Network ExtraHop unveiled new network-based file analysis capabilities in ExtraHop RevealXTM to detect malware, combat ransomware and help prevent data loss. With built-in file hashing, file-based detections and file carving, SOC analysts can leverage the power of the network to reduce their…

Read More

The future of data privacy and compliance (and how to stop it)

The future of data privacy and compliance (and how to stop it)

With 2024 upon us, experts are once again sharing best practices for adapting your business’ data strategy to the times. From ensuring compliance with state-by-state privacy laws to preparing for the inevitable removal of third-party cookies over the course of the year, organizations face ever-increasing pressure to adapt to new realities. Still, mere compliance isn’t enough: the winners will be those who can follow the rules without sacrificing their ability to glean valuable insights or…

Read More

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Users question corporate data responsibility & privacy

Users question corporate data responsibility & privacy

Users question corporate data responsibility & privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

100 top e-commerce sites create data privacy risks for consumers

100 top e-commerce sites create data privacy risks for consumers

100 top e-commerce sites create data privacy risks for consumers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Dark data: The underestimated cybersecurity threat

Dark data: The underestimated cybersecurity threat

Dark data: The underestimated cybersecurity threat | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

California ADCA bill aims to increase children’s data privacy

California ADCA bill aims to increase children’s data privacy

California ADCA bill aims to increase children’s data privacy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Gaining business advantage through privacy engineering

Gaining business advantage through privacy engineering

Gaining business advantage through privacy engineering | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Data: The future of quantifying risk

Data: The future of quantifying risk

Data: The future of quantifying risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More