14% of security leaders balance data security and business objectives

14% of security leaders balance data security and business objectives

A survey from Gartner reveals only 14% of security leaders can balance data security with business objectives for said data. The survey was conducted from June through August in 2024, gathering responses from 318 senior security leaders across the globe, featuring organizations of various industries and sizes.  “With only 14% of SRM leaders able to secure their data while supporting business goals, many organizations can face increased vulnerability to cyber threats, regulatory penalties, and operational…

Read More

The fundamentals of cybersecurity in the age of AI

The fundamentals of cybersecurity in the age of AI

As we advance into 2025, the cybersecurity landscape continues to evolve at an unprecedented pace. While discussions around AI’s potential to revolutionize security teams are omnipresent, it’s crucial not to lose sight of the foundational elements that underpin effective cybersecurity. Among these fundamentals, Identity and Access Management (IAM) remains a cornerstone, ensuring that only authorized individuals can access sensitive information and resources. This article explores the core principles of cybersecurity, emphasizing the vital role of…

Read More

The future of enterprise protection: Integrated data security platforms

The future of enterprise protection: Integrated data security platforms

Less than five years ago, one would have been hard-pressed to find information on Data Security Posture Management (DSPM). Today, it is a central pillar of modern cybersecurity strategies. The growth of DSPM from a relatively new technology to a must-have capability of the cybersecurity landscape reflects the growing need for organizations to protect and control their data in the face of increasing complexity in the cloud and the broadening use of AI in the…

Read More

Shadow AI: The silent threat to enterprise data security

Shadow AI: The silent threat to enterprise data security

Just as IT departments have started to get a handle on shadow IT by setting policies for oversight and permissions on the use of applications, a new challenge has emerged — shadow AI. The rapid adoption of AI-powered workplace tools introduces an unprecedented level of risk.  While AI promises to supercharge employee productivity, the unsanctioned use of generative AI (GenAI) tools significantly increases the risk of data breaches. Organizations already struggling to get control of…

Read More

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy concerns have never been more urgent. Case in point: The newly popular AI tool DeepSeek. Behind the convenience the tool provides lies a privacy policy that should be a cause for pause for anyone who values their personal security. DeepSeek’s privacy policy openly states that the wide array of user data they collect goes to servers in China. This alone…

Read More

Celebrating Data Privacy Day: Experts share data protection insights

Celebrating Data Privacy Day: Experts share data protection insights

January 28, 2025 marks Data Privacy Day, an international event established to raise awareness for data protection best practices. Below, cybersecurity experts are sharing their insights on essential practices for protecting sensitive data.  Cyber preparedness James Hadley, Founder and CEO of Immersive Labs, discuses the value of cyber training and preparedness. Hadley states, “In 2024, we witnessed the fallout of major record-breaking data breaches; some of which resulted in more than 100 million people having…

Read More

Priorities and misconceptions: Improving security posture in 2025

Priorities and misconceptions: Improving security posture in 2025

Protecting enterprises from data breaches, patching vulnerabilities, and addressing phishing or zero day attacks is no easy feat. Chief Information Security Officers (CISOs) and their security teams must work 24/7/365 to ensure their organization’s networks and sensitive corporate data remain secure and out of the hands of nefarious actors. CISOs’ priorities vary depending on the size of their organization and whether it operates in a highly regulated industry such as healthcare or finance, and the…

Read More

The end of digital transformation, the rise of AI transformation

The end of digital transformation, the rise of AI transformation

The modern technology landscape is becoming increasingly advanced, and many enterprises are still trying to catch up. With the growing prominence of generative AI, organizational data is faced with new risks.  Here, we talk with Steve Tait, Chief Technology Officer at Skyhigh Security, regarding the key areas of risk that generative AI can create.  Security magazine: Tell us about your background and career. Tait: I began my career as an engineer in the emerging mobile…

Read More

Why data protection is non-negotiable for every business

Why data protection is non-negotiable for every business

Every morning, I start my day by reading the news, and every morning, I see headlines about major cyberattacks and breaches causing damage to companies, brands, and people around the world. The barrage of attacks and the damage that goes with them are relentless. Attackers will always be on the lookout for soft targets, but my experience has taught me that implementing some basic yet powerful protections can shield most organizations from ransomware attacks and…

Read More

Protecting healthcare data, improving trust through security measures

Protecting healthcare data, improving trust through security measures

Data security is of paramount concern to all healthcare organizations. In today’s digital age, protecting sensitive medical information is not just a regulatory requirement but a cornerstone of trust and business integrity. Patients and members expect data privacy, but are frequently disappointed by multiple data breaches. There are ways to mitigate data breaches and create an environment where healthcare organizations and the companies that support them can thrive and provide important healthcare services. Safeguarding a…

Read More
1 2 3 14