Shadow AI: The silent threat to enterprise data security

Shadow AI: The silent threat to enterprise data security

Just as IT departments have started to get a handle on shadow IT by setting policies for oversight and permissions on the use of applications, a new challenge has emerged — shadow AI. The rapid adoption of AI-powered workplace tools introduces an unprecedented level of risk.  While AI promises to supercharge employee productivity, the unsanctioned use of generative AI (GenAI) tools significantly increases the risk of data breaches. Organizations already struggling to get control of…

Read More

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

As AI technologies rapidly evolve and become more integrated into our daily lives, data privacy concerns have never been more urgent. Case in point: The newly popular AI tool DeepSeek. Behind the convenience the tool provides lies a privacy policy that should be a cause for pause for anyone who values their personal security. DeepSeek’s privacy policy openly states that the wide array of user data they collect goes to servers in China. This alone…

Read More

Celebrating Data Privacy Day: Experts share data protection insights

Celebrating Data Privacy Day: Experts share data protection insights

January 28, 2025 marks Data Privacy Day, an international event established to raise awareness for data protection best practices. Below, cybersecurity experts are sharing their insights on essential practices for protecting sensitive data.  Cyber preparedness James Hadley, Founder and CEO of Immersive Labs, discuses the value of cyber training and preparedness. Hadley states, “In 2024, we witnessed the fallout of major record-breaking data breaches; some of which resulted in more than 100 million people having…

Read More

Priorities and misconceptions: Improving security posture in 2025

Priorities and misconceptions: Improving security posture in 2025

Protecting enterprises from data breaches, patching vulnerabilities, and addressing phishing or zero day attacks is no easy feat. Chief Information Security Officers (CISOs) and their security teams must work 24/7/365 to ensure their organization’s networks and sensitive corporate data remain secure and out of the hands of nefarious actors. CISOs’ priorities vary depending on the size of their organization and whether it operates in a highly regulated industry such as healthcare or finance, and the…

Read More

The end of digital transformation, the rise of AI transformation

The end of digital transformation, the rise of AI transformation

The modern technology landscape is becoming increasingly advanced, and many enterprises are still trying to catch up. With the growing prominence of generative AI, organizational data is faced with new risks.  Here, we talk with Steve Tait, Chief Technology Officer at Skyhigh Security, regarding the key areas of risk that generative AI can create.  Security magazine: Tell us about your background and career. Tait: I began my career as an engineer in the emerging mobile…

Read More

Why data protection is non-negotiable for every business

Why data protection is non-negotiable for every business

Every morning, I start my day by reading the news, and every morning, I see headlines about major cyberattacks and breaches causing damage to companies, brands, and people around the world. The barrage of attacks and the damage that goes with them are relentless. Attackers will always be on the lookout for soft targets, but my experience has taught me that implementing some basic yet powerful protections can shield most organizations from ransomware attacks and…

Read More

Protecting healthcare data, improving trust through security measures

Protecting healthcare data, improving trust through security measures

Data security is of paramount concern to all healthcare organizations. In today’s digital age, protecting sensitive medical information is not just a regulatory requirement but a cornerstone of trust and business integrity. Patients and members expect data privacy, but are frequently disappointed by multiple data breaches. There are ways to mitigate data breaches and create an environment where healthcare organizations and the companies that support them can thrive and provide important healthcare services. Safeguarding a…

Read More

Data breaches: Preventing and responding

Data breaches: Preventing and responding

It seems as though every day, there’s news of another data breach. As the threats of data breaches continue to evolve, organizations must prepare to respond. Best case scenario, organizations will take precautionary steps to prevent breaches whenever possible. But why are data breaches such a prevalent threat to the modern enterprise? Claudette McGowan, Chief Executive Officer at Protexxa, explains, “We’ve seen this rush to digitize everything. As this world is changing and going from…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More
1 2 3 14