Over the last few years, the volume and variety of data that organizations have access to has exploded, with 64% of organizations managing at least one petabyte (which is 1 million gigabytes, or 1,000 ...
Earlier this month, the now viral social network Moltbook exposed 1.5 million API authentication tokens and 35,000 email addresses within days of launch. The cause: a single misconfigured database ...
All Delaware insurers must submit annual compliance certification by February 15 under the state’s Insurance Data Security Act ...
In 2025, data centers face a rapidly evolving security landscape, driven by technological advancements like artificial intelligence, cloud integration, the Internet of Things, and a rise in ...
Over the weekend, security experts were beginning to panic. MITRE announced that the US government had not renewed funding for the Common Vulnerabilities and Exposures (CVE) database. MITRE VP Yosry ...
If we want to avoid making AI agents a huge new attack surface, we’ve got to treat agent memory the way we treat databases: with firewalls, audits, and access privileges. The pace at which large ...
Evolving technology and advanced attackers have created new data security concerns for enterprises. There's more data available than ever, particularly thanks to artificial intelligence (AI) and more ...
In a sign of how pervasive data sharing has become, businesses may face challenges complying with a new government rule restricting data use outside the US. The US Department of Justice's (DoJ) Data ...
Vast and growing data volumes and the shifting nature of threats are complicating the CISO’s job. Experts say a sound foundational risk management approach and essential data protection tools can help ...
Despite fresh tweaks to Turkey’s cybersecurity infrastructure, mass data breaches continue. No surprise, say experts, when policy is not implemented and the security culture goes unchallenged. In ...
Several mental health mobile apps with millions of downloads on Google Play contain security vulnerabilities that could expose users' sensitive medical information.