#data-security

[ follow ]
fromHackernoon
1 year ago

Defining the Edge: Our Unique Focus on Cross-Language Crypto Challenges | HackerNoon

Transport layer security (TLS) is the most discussed technique, with Cross-Site Scripting (XSS) being a primary concern in data transmission security.
#generative-ai
fromThe Hacker News
1 month ago
Artificial intelligence

Empower Users and Protect Against GenAI Data Loss

Blocking access to generative AI tools isn't a sustainable solution; it drives usage underground and creates risks organizations can't ignore.
fromComputerWeekly.com
1 month ago
Artificial intelligence

CISOs: Don't block AI, but adopt it with eyes wide open | Computer Weekly

Adopting generative AI requires careful risk assessment and policy alignment to avoid potential pitfalls.
Artificial intelligence
fromInfoQ
6 days ago

Google Apigee Adds Built-in LLM Governance with Model Armor

Google Cloud's Model Armor provides LLM governance through integrated API management with features like prompt validation and output filtering.
fromHackernoon
1 month ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
fromHackernoon
2 years ago

Securing Data at Rest: From LUKS to NBDE - A Modern Encryption Guide | HackerNoon

Full disk encryption is essential for data security against theft or unauthorized access.
#privacy
fromZDNET
1 week ago
Privacy technologies

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

fromZDNET
1 week ago
Privacy technologies

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

#data-breach
fromDatabreaches
1 month ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

fromDatabreaches
1 month ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

#artificial-intelligence
fromBusiness Insider
1 week ago
Artificial intelligence

A leaked list shows which websites were used to improve Anthropic's chatbot - and which ones were off-limits

fromBusiness Insider
1 week ago
Artificial intelligence

A leaked list shows which websites were used to improve Anthropic's chatbot - and which ones were off-limits

Privacy professionals
fromTechRadar
1 week ago

I am a privacy expert and this is why I believe user personalization is the future of privacy

Personalized marketing raises privacy concerns and necessitates strategic approaches to build consumer trust.
#ai-technology
#cybersecurity
fromHackernoon
3 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

Information security
fromNextgov.com
1 month ago

US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers

Comcast and Digital Realty are possibly compromised by the Chinese hacking group Salt Typhoon, posing risks to U.S. infrastructure.
fromHackernoon
3 months ago
Privacy technologies

Beyond the Perimeter: Architecting Trust in the Cloud-Native Era by Mohit Kumar Singh | HackerNoon

Information security
fromNextgov.com
1 month ago

US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers

Comcast and Digital Realty are possibly compromised by the Chinese hacking group Salt Typhoon, posing risks to U.S. infrastructure.
fromwww.mercurynews.com
1 week ago

Bay Area tech firm claims analyst used her vacation to download trade secrets, after showing insubordinate work attitude'

Green Grid's lawsuit claims Zihan Yuan downloaded confidential files during a personal leave, accessing sensitive company data irrelevant to her job role. The firm seeks damages.
Privacy professionals
fromComputerworld
1 week ago

As AI agents go mainstream, companies lean into confidential computing for data security

Successful agentic AI requires robust data protection strategies from companies.
US news
fromDatabreaches
1 week ago

Missouri Adopts New Data Breach Notice Law

Missouri's Insurance Data Security Act establishes data security standards for insurers and licensed entities, effective January 1, 2026.
fromIT Pro
1 week ago

IT leaders are facing major work device blind spots - and it's putting security at risk

Nearly a quarter of UK businesses detect unauthorized devices accessing corporate data at least every month, with nearly half having experienced a data breach caused by unmanaged devices during the last year alone.
Privacy professionals
fromIndependent
1 week ago

Dear Vicki: My staff have become over-reliant on AI. How do I get them to use it appropriately?

Employees in advertising are reliant on AI tools for research and idea generation, with concerns about misuse and lack of verification, raising questions around productivity and information security.
Productivity
fromWIRED
1 week ago

How to Limit Galaxy AI to On-Device Processing-or Turn It Off Altogether

Samsung Galaxy AI data is encrypted, but security can never be 100% guaranteed.
fromThe Hacker News
1 week ago

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

"CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS."
Information security
fromwww.independent.co.uk
1 week ago

Hundreds of MoD data breaches revealed as security questions raised after Afghan leak

Over 569 data incidents occurred in the Ministry of Defence in 2023-24, revealing significant concerns about their ability to protect sensitive information securely. This is an increase from 550 incidents the previous year and includes losses of electronic devices and mishandling of protected documents.
UK news
fromComputerworld
1 week ago

How to use Microsoft Teams securely

Microsoft Teams continues to gain ground as a business collaboration tool, in part because Microsoft has tied the meeting and messaging app ever more tightly to the rest of its Microsoft 365 productivity suite over the years.
Privacy professionals
US politics
fromLos Angeles Times
1 week ago

ICE is gaining access to trove of Medicaid records, adding new peril for immigrants

The Trump administration plans to hand over personal data of 79 million Medicaid recipients to immigration officials to track undocumented immigrants.
fromTechCrunch
1 week ago

Confident Security, 'the Signal for AI,' comes out of stealth with $4.2M | TechCrunch

"The second that you give up your data to someone else, you've essentially reduced your privacy," Jonathan Mortensen, founder and CEO of Confident Security, told TechCrunch. "And our product's goal is to remove that trade-off."
Privacy technologies
#ai
fromBusiness Insider
1 month ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

fromBusiness Insider
1 month ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

#aws
fromMedium
2 weeks ago
Privacy technologies

Ensuring Security in AWS Migration: Best Practices for a Risk-Free Transition

Migrating to AWS offers scalable opportunities but entails security risks that must be managed during the process.
fromHackernoon
1 month ago
European startups

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
fromMedium
2 weeks ago
Privacy technologies

Ensuring Security in AWS Migration: Best Practices for a Risk-Free Transition

European startups
fromHackernoon
1 month ago

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
UK news
fromwww.bbc.com
2 weeks ago

Three key questions after Afghan data leak sparked unprecedented secret evacuation

The UK government is relocating Afghans at risk from Taliban retribution, following a data leak that has raised significant security concerns.
fromHackernoon
1 year ago

The HackerNoon Newsletter: Complete Gemini CLI Setup Guide for Your Terminal (7/13/2025) | HackerNoon

Major data breaches teach crucial lessons in backup and security practices.
Machine identities will surpass human users, necessitating a shift in security approaches.
Entry-level job positions are declining, largely due to automation in IT roles.
Privacy technologies
fromFortune
2 weeks ago

Exclusive: Virtru, data security company, raises $50 million Series D as valuation hits $500 million

Data's importance extends beyond security and technology to societal trust.
#tiktok
fromThe Verge
1 month ago
US politics

Trump is giving TikTok another ban extension

The Trump administration extended TikTok's deadline for divestiture, raising concerns over the legal protection for service providers.
fromIrish Independent
1 month ago
EU data protection

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
EU data protection
fromIrish Independent
1 month ago

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
fromIndependent
3 weeks ago

Thousands of files 'deleted' by ex-director, High Court is told

Reward Catering and Swedish owners are involved in a High Court dispute over unauthorized computer access and document deletion post-acquisition.
fromZDNET
3 weeks ago

How passkeys work: Do your favorite sites even support passkeys?

Compromised usernames and passwords have typically been at the root of many damaging data breaches, highlighting the inadequacy of current authentication methods.
Privacy professionals
Privacy technologies
fromWIRED
3 weeks ago

McDonald's AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Who Tried the Password '123456'

McDonald's uses an AI chatbot, Olivia, to screen applicants, which suffered from significant security flaws allowing access to sensitive data.
fromHubspot
in 1 month

7 best CRM software for government agencies

Government organizations require sophisticated tools to manage complex stakeholder relationships while adhering to strict compliance requirements.
Digital life
Privacy technologies
fromIT Pro
3 weeks ago

26 million CVs were exposed when a recruiting software firm left a misconfigured Azure container open - cybersecurity experts warn it's an easy mistake that's becoming far too common

A recruitment database leak exposed nearly 26 million resumes due to misconfigured storage, raising concerns about targeted phishing risks.
fromBusiness Matters
3 weeks ago

Data Security Posture Management - The Next Big Data Solution Your Business Needs (And How to Get Started)

Data security posture management (DSPM) offers a solution to effectively manage the increasing volume of data, ensuring a unified view and compliance across platforms.
Data science
fromTechzine Global
3 weeks ago

Percona offers clear view into Transparent Data Encryption

Percona has announced its Transparent Data Encryption (TDE) extension for PostgreSQL, designed to secure sensitive data at rest and meet compliance requirements.
Digital life
fromComputerWeekly.com
4 weeks ago

Podcast: AIOps in storage management, security and sustainability | Computer Weekly

AIOps, or artificial intelligence operations, streamline and enhance IT operations, akin to a fitness watch for the datacentre, gathering data, analyzing it, and providing insights.
Artificial intelligence
fromThe Hacker News
1 month ago

Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories

Identity-based attacks are rising, with attackers increasingly using stolen credentials to gain access.
fromZDNET
1 month ago

How proxy servers actually work, and why they're so valuable

Proxy servers act as intermediaries, providing IP anonymity by replacing the user's IP during requests.
Unlike VPNs, proxy servers do not encrypt data, offering less protection and security for online communications.
Privacy professionals
fromInfoWorld
1 month ago

Three steps to boost Amazon S3 data security

Organizations must audit identities with SSE-C privileges to enhance data security.
Strictly manage user access to sensitive data to prevent breaches.
fromElectronic Frontier Foundation
1 month ago

Flock Safety's Feature Updates Cannot Make Automated License Plate Readers Safe

Flock Safety is reinforcing surveillance systems that have previously led to legal violations, raising serious privacy concerns for American citizens.
fromTheregister
1 month ago

Patients, providers duped in records-and-payment scam

Criminals masquerading as insurers are tricking patients and healthcare providers into handing over medical records and bank account information via emails and text messages, according to the FBI.
Healthcare
Remote teams
fromForbes
1 month ago

19 Common IT Inventory Mistakes In Remote Workplaces

IT teams face significant challenges in managing remote device inventories, risking data exposure and asset loss due to common management mistakes.
fromDevOps.com
1 month ago

App Migration: How to Build a Winning Risk Management Plan - DevOps.com

Application migration offers benefits but is fraught with risks like data loss and budget overruns requiring a proactive risk management strategy.
London politics
fromTheregister
1 month ago

Glasgow council yanks services offline amid attack cleanup

A cyberattack on Glasgow City Council disrupts numerous digital services, linking the incident to a third-party contractor's supplier.
Privacy technologies
fromComputerworld
1 month ago

US House reportedly bans WhatsApp from staffers' devices over security concerns

Consumer messaging apps fail to meet enterprise compliance and data retention needs, posing risks to sensitive business info.
fromTechzine Global
1 month ago

Thales covers data security entirety thanks to Imperva

Thales' acquisition of Imperva resulted in a comprehensive data security solution enhancing prevention, detection, and risk analysis capabilities.
Information security
fromIT Pro
1 month ago

'A huge national security risk': Thousands of government laptops, tablets, and phones are missing and nowhere to be found

The UK government has lost over 2,000 devices, raising cybersecurity concerns amidst a financial loss of over £1 million.
fromBusiness Insider
1 month ago

Scale AI has a data security problem

Scale AI faces serious security challenges, using public Google Docs for sensitive information, raising concerns despite no confirmed breaches.
fromTheregister
1 month ago

Asana MCP server back online after plugging a data-leak hole

Asana fixed a bug in its Model Context Protocol server that risked exposing user data.
fromNextgov.com
1 month ago

USTPO touts success in AI applications

The USPTO is enhancing operations by adopting generative AI technologies, particularly through tools like Scout, despite initial challenges.
DevOps
fromAzure DevOps Blog
1 month ago

Azure DevOps MCP Server, Public Preview - Azure DevOps Blog

Azure DevOps MCP Server enhances GitHub Copilot's capabilities with real-time context access.
fromThe Nevada Independent
1 month ago

We caught Nevada sharing personal health data with Big Tech - The Nevada Independent

State-run health care websites are leaking sensitive health information to tech companies, compromising user privacy.
fromTheregister
1 month ago

Microsoft brings 365 suite on-prem as part of sovereign push

Microsoft has launched Microsoft 365 Local for enhanced compliance and control in European markets.
fromwww.npr.org
1 month ago

Top House Democrat asks Microsoft about DOGE code allegedly tied to NLRB data removal

The DOGE team is accused of hiding data related to union organizing and obstructing oversight efforts.
#startup-funding
fromIT Pro
1 month ago

RSAC in focus: Quantum computing and security

Quantum computing poses an immediate threat to current encryption methods, necessitating proactive security measures against potential future attacks.
fromZDNET
1 month ago

Yet another European government is ditching Microsoft for Linux - here's why

Germany's Schleswig-Holstein will phase out Microsoft software for open-source solutions to ensure data sovereignty and independence.
fromDatabreaches
1 month ago

Slapped wrists for Financial Conduct Authority staff who emailed work data home

Four FCA employees received warnings for sending regulatory data to personal accounts, highlighting serious data security concerns.
fromDatabreaches
1 month ago

Plastic surgeons often store nude photos of patients with their identity information. When would we call that "negligent?"

The serious data breach at Hankins & Sohn Plastic Surgery has sparked concerns about the duty of care that medical practitioners have towards their patients regarding data security.
fromTheregister
1 month ago

FCA warned four staffers who pocketed regulator data

Data security at the UK's FCA was compromised when staff emailed regulator data to personal accounts, leading to warnings for four employees.
Marketing tech
fromComputerworld
1 month ago

Salesforce changes Slack API terms to block bulk data access for LLMs

Slack has changed its API terms to prohibit LLM training on its data, impacting data discovery efforts across organizations.
SF politics
fromWIRED
1 month ago

Senators Warn DOGE's Social Security Administration Work Could Break Benefits

Concerns over DOGE's tech reforms risk instability within the Social Security Administration's infrastructure, potentially affecting benefit delivery.
fromLondon On The Inside
1 month ago

Brits Are Flocking to Online Casinos | But What Are They Doing to Protect Their Data?

Online casino gaming in the UK is rising but necessitates robust data security measures.
Players are prioritizing privacy, opting for reputable casinos and monitoring their accounts.
fromSecuritymagazine
1 month ago

The Security Risk No One Talks About During Layoffs: Offboarding

Insider threats often stem from inadequate offboarding processes, with nearly 90% of former employees retaining access to sensitive systems post-departure, highlighting security vulnerabilities.
Remote teams
fromAmazon Web Services
1 month ago

How Kepler democratized AI access and enhanced client services with Amazon Q Business | Amazon Web Services

Our commitment to clarity and security drives our operations, taking inspiration from Johannes Kepler to illuminate the path for our Fortune 500 clients.
Marketing tech
Artificial intelligence
fromTheregister
1 month ago

Schneier to House: AI fawning obscures security concerns

Bruce Schneier highlights risks of AI in government, warning against negligence in data handling by DOGE and public enthusiasm for AI technology.
Marketing tech
fromMarTech
1 month ago

HubSpot's ChatGPT connector generates excitement and some concerns | MarTech

HubSpot's ChatGPT connector excites users but raises valid concerns about customer data security.
fromZDNET
1 month ago

Cybercriminals are stealing business Salesforce data with this simple trick - don't fall for it

Beware of vishing attacks targeting Salesforce; hackers may impersonate IT support to steal data.
[ Load more ]