Best AI Security Tools: Top Solutions, Features & Comparisons

Best AI Security Tools: Top Solutions, Features & Comparisons

Generative AI features in enterprise software can be double-edged swords. AI introduces complexities and its own security issues. At the same time, it can speed up processes and enable new capabilities. The tools we’ve chosen here were often highly rated platforms before generative AI entered the scene, and we’ve rated them in part on longevity and positive reviews over time. Where AI features are major selling points for the products, we’ve examined them based on…

Read More

Report Highlights Rising Risks in Sensitive Data Management

Report Highlights Rising Risks in Sensitive Data Management

The volume of sensitive data that companies are harbouring in non-production environments, like development, testing, analytics, and AI/ML, is rising, according to a new report. Executives are also getting more concerned about protecting it — and feeding it into new AI products is not helping. The “Delphix 2024 State of Data Compliance and Security Report” found that 74% of organisations that handle sensitive data increased the volume kept in non-production, also known as lower, environments…

Read More

Small businesses need to secure data before tapping into AI

Small businesses need to secure data before tapping into AI

AI is the acronym on everyone’s lips this summer. Generative AI tools have gone mainstream, and nearly everyone has heard an AI use case that piques their interest. But you’ve got questions about the cost, the security, and how to use your data because you’re a small business, not an enterprise with massive resources. AI is a growth tool that can be a game-changer for smaller businesses. Using existing AI tools to automate and streamline…

Read More

Embrace the data sprawl, securely

Embrace the data sprawl, securely

Data is the lifeblood of every enterprise, so why does the task of managing and securing rapidly expanding volumes and types of data and new, modern threats continue to be a formidable challenge for most organizations? According to the Identity Theft Resource Center (ITRC), 2023 set a new record for data breaches, with data compromises jumping 78% over 2022. Malicious actors obviously see the value of data — but without visibility and controls into where…

Read More

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

Australian Organisations Face Tensions Between Personalisation, Privacy

Australian Organisations Face Tensions Between Personalisation, Privacy

Organisations in Australia face a significant challenge with data. On the one hand, there is a demand for personalised services. Consumers are willing to share their data if it means better personalisation. On the other hand, there is a real concern about privacy, and while organisations are focused on looking for ways to prevent data breaches, efforts to do better to protect customer privacy are more haphazard. Why organisations want data to deliver personalisation Personalisation…

Read More

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

What Australia’s Digital ID Means to How Citizens Interact With Businesses Online

Australia is about to get a national online ID system — the Digital ID — which promises to improve the security and privacy of data online. However, concerns among Australians persist. In just a few months, Australians will have access to a new form of ID, which aims to make identification online much safer. It’s called the Digital ID, and it will form a cornerstone of the government’s strategy to improve the security of data…

Read More

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

The success of Australia’s six-shield cybersecurity strategy could depend on how well the nation manages the vast pools of data that will underpin the identification and mitigation of cyberthreats. Australia’s Home Affairs Minister Clare O’Neil recently revealed details of Australia’s Cyber Security Strategy 2023–2030. Designed to protect Australia in a fast-moving threat environment, the strategy would rely on building six cyber shields around the Australian nation. Jessie Jamieson, staff research engineer for decision science operations…

Read More

Protecting enterprise data — wherever it lives

Protecting enterprise data — wherever it lives

Protecting enterprise data — wherever it lives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry

The hidden risk within the surveillance industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 4