#data-security

[ follow ]
fromClickUp
2 days ago

15 Best GPTs for Accounting to Simplify Finances in 2025 | ClickUp

There's never enough time in the day for an accountant. Between balancing ledgers, chasing down missing invoices, and ensuring compliance with changing tax laws, it's easy to feel buried in work. But what if artificial intelligence (AI) can handle it for you accurately and instantly? Thanks to advancements in AI, GPT-powered tools are here to take the stress out of accounting. These tools are designed to streamline financial tasks, provide real-time insights, and help you stay organized, all while saving you time.
Business
#social-security
fromNextgov.com
2 days ago
US politics

Senate Finance Chair wants details from SSA following whistleblower allegations of data endangerment

fromNextgov.com
2 days ago
US politics

Senate Finance Chair wants details from SSA following whistleblower allegations of data endangerment

Artificial intelligence
fromeLearning Industry
3 days ago

What Sets AI Mentor Apart From General AI Assistants?

AI Mentor is a customizable, secure, scalable corporate AI training solution trained on approved company content for consistent, role-based, context-aware learner support.
US politics
fromTheregister
3 days ago

SSA asked to explain response to DOGE whistleblower

Senator Mike Crapo demands answers on alleged duplication of the Numident database to an unmanaged test cloud and seeks immediate confirmation of any unauthorized access.
#ai
Artificial intelligence
fromZDNET
4 days ago

Use Claude's new feature at your own risk - here's why

Claude AI can create and edit Word, Excel, PowerPoint, and PDF files, but file-creation access risks exposing sensitive data and requires monitoring for misuse.
Artificial intelligence
fromFast Company
4 days ago

What is 'BYOAI' and why it's a serious threat to your company

Employees are rapidly adopting unapproved AI agents (BYOAI) to boost productivity, creating governance, data leakage, and power-asymmetry risks that outpace corporate controls.
US news
fromwww.npr.org
4 days ago

33 million voters have been run through a Trump administration citizenship check

A revamped SAVE tool has been used to check citizenship and death status for over 33 million voters, prompting concerns about accuracy, data security, and oversight.
Law
fromAdExchanger
4 days ago

The Reasoning Behind The Remedies; The Demise Of De Minimis | AdExchanger

Judge banned Google from exclusive default search deals; ending de minimis will raise import costs and alter retail and consumer purchasing behaviors.
Artificial intelligence
fromTheregister
6 days ago

Perplexity (hopes to) join US government discount AI fest

Perplexity launched an Enterprise Pro for Government offering, pledging new security measures and discounts while acknowledging public AI tools expose federal data.
Artificial intelligence
fromComputerWeekly.com
6 days ago

AI without borders: Why the next advantage is in model ownership, not just access | Computer Weekly

Long-term AI advantage requires enterprise ownership of models as governed, customized core assets rather than relying solely on external access services.
fromAbove the Law
1 week ago

Lawyers Need A Panel To Explain Texting Because We're Still One Notification Away From An Ethics Apocalypse - Above the Law

Here at Kaleidoscope, the newly minted 8am's inaugural conference, lawyers gathered to hear about the dangers lurking in their pockets. Rather than being happy to see us, the phones they lug around carry a ticking ethical timebomb poised to erupt as their terminally Millennial clients demand to talk about their cases over SMS. It's not an outlier scenario anymore. Mark Palmer, Chief Counsel of the Illinois Supreme Court Commission on Professionalism, explained that 59 percent of clients want to communicate with their lawyers by text.
Law
Information security
fromTechCrunch
1 week ago

Pornhub owner pays $5M settlement to FTC over historic failure to block abusive content | TechCrunch

Aylo will pay $5 million to settle claims it profited from CSAM and nonconsensual content while inadequately protecting performer data and enforcement systems.
#cyberattack
Information security
fromwww.bbc.com
1 week ago

Jaguar Land Rover production severely hit by cyber-attack

A cyber-attack severely disrupted Jaguar Land Rover's production and retail operations, forcing IT shutdowns while no customer data has been found stolen.
#social-security-administration
fromwww.mediaite.com
2 weeks ago
Privacy professionals

Top Social Security Official Resigns After Claiming DOGE Uploaded Confidential Information to Insecure Server

fromwww.mediaite.com
2 weeks ago
Privacy professionals

Top Social Security Official Resigns After Claiming DOGE Uploaded Confidential Information to Insecure Server

#data-breach
fromWIRED
3 weeks ago
Privacy professionals

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database

fromWIRED
3 weeks ago
Privacy professionals

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database

Information security
fromDevOps.com
2 weeks ago

Staying on Top of Shadow AI - DevOps.com

Unsanctioned AI tools are rapidly adopted across organizations, reshaping decisions, exposing data, and creating governance and compliance risks before leadership notices.
#numident
fromwww.theguardian.com
2 weeks ago

Politicians risk ignoring many voters by not being on TikTok, Tory MP warns

You've got to be where the electorate are, Evans told the Guardian. This is one of the biggest apps that is used across the country and across the word. I think it's right to be there, to be talking to people. And from a party political point of view, if you're crowded out and you're not speaking to people, that space will get filled. Hearing 20% of someone versus nothing from someone else is huge.
UK politics
Artificial intelligence
fromTechzine Global
3 weeks ago

Alation launches chatbot for business data

An enterprise AI chatbot provides metadata-aware natural-language queries with transparent provenance, improved accuracy, and security while querying data in place without vendor lock-in.
Artificial intelligence
fromTheregister
3 weeks ago

KPMG wrote 100-page prompt to build agentic TaxBot

KPMG built a multi-vendor private AI platform and a 100-page prompt-based agentic system to accelerate tax advice while addressing data security risks.
Tech industry
fromHackernoon
1 year ago

The TechBeat: Why Hydra Is the Most Practical Scaling Solution in Web3 (8/19/2025) | HackerNoon

1.1 million sensitive messages were exposed due to misconfiguration of Tea's Firebase.
#artificial-intelligence
fromBusiness Insider
1 month ago
Artificial intelligence

A leaked list shows which websites were used to improve Anthropic's chatbot - and which ones were off-limits

fromBusiness Insider
1 month ago
Artificial intelligence

A leaked list shows which websites were used to improve Anthropic's chatbot - and which ones were off-limits

fromTheregister
3 weeks ago

Microsoft's Nuance settles MOVEit breach suit for $8.5M

Nuance's proposed settlement of $8.5 million addresses claims that it failed to secure personal information during the MOVEit Transfer mega-breach, impacting 1.225 million individuals.
Privacy professionals
E-Commerce
fromZDNET
3 weeks ago

How web scraping actually works - and why AI changes everything

Web scraping powers pricing, SEO, security, AI, and research industries.
#hmrc
fromHackernoon
1 year ago

The TechBeat: Refactoring 031 - Removing OOPs (8/17/2025) | HackerNoon

Tea's Firebase misconfiguration exposed 1.1M sensitive messages, raising concerns over data security and highlighting the crucial need for better configuration practices.
Tech industry
Privacy technologies
fromWIRED
4 weeks ago

Gear News of the Week: A New Privacy Phone Arrives, and Samsung Has a $30K 115-Inch Micro RGB TV

Up Phone promises enhanced privacy features but faces skepticism due to outdated specs and past controversies.
Privacy technologies
fromIT Pro
4 weeks ago

Using DeepSeek at work is like 'printing out and handing over your confidential information'

DeepSeek poses serious risks to sensitive data, potentially exposing it to Chinese authorities.
fromZDNET
4 weeks ago

This flash drive offers military-grade protection for a budget price tag

The Kingston IronKey Vault Privacy 50 features XTS-AES 256-bit hardware encryption, ensuring data is always stored encrypted and never in plain text, maximizing security for users.
Gadgets
Privacy professionals
fromTheregister
4 weeks ago

Telco giant Colt suffers attack, takes systems offline

Colt Technology Services experienced a cyber incident affecting its customer portal and other services without reports of data breaches.
fromTheregister
4 weeks ago

Boffins: LLM chatbots trivial to weaponise for data theft

AI chatbots are widespread in many different sectors as they can provide natural and engaging interactions. We already know these models aren't good at protecting information.
Privacy technologies
Privacy technologies
fromHackernoon
1 month ago

BingX PCI DSS Certification Sets New Benchmark For Data Security In Web3 | HackerNoon

BingX achieved PCI DSS v4.0.1 certification, enhancing security for fiat transactions and data privacy.
#encryption
fromZDNET
1 month ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

fromZDNET
1 month ago
Privacy technologies

This SSD gadget locks prying eyes out and makes me feel like James Bond

Law
fromAbove the Law
1 month ago

The Dollar Signs Are Heading Your Way! - See Also - Above the Law

Hueston Hennigan announces summer bonuses, DOJ leaks lawyer identities, Biglaw partner dies in suicide, bar exam participation offers $1500, PACER hacked.
#chatgpt
fromForbes
1 month ago
Privacy professionals

ChatGPT Warning: Change This Setting To Protect Your Business Data And Privacy

fromForbes
1 month ago
Privacy professionals

ChatGPT Warning: Change This Setting To Protect Your Business Data And Privacy

#cybersecurity
fromWIRED
1 month ago
Privacy technologies

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug

fromWIRED
1 month ago
Privacy technologies

It Looks Like a School Bathroom Smoke Detector. A Teen Hacker Showed It Could Be an Audio Bug

fromTheregister
1 month ago

UK proxy traffic surges as users consider VPN alternatives

"Encryption alone doesn't guarantee a secure connection. True security depends on how traffic is routed, what's exposed, and how much control the company has. With proxies, only selected traffic is routed, giving enterprises tighter control, lower attack surface, and better integration into existing security policies."
Privacy technologies
fromIT Pro
1 month ago

LastPass just launched a tool to help security teams keep tabs on shadow IT risks

"Small and mid-sized businesses are facing a perfect storm of complexity: unknown risks living within unknown apps and AI services," said Don MacLennan, Chief Product Officer at LastPass.
Privacy technologies
from24/7 Wall St.
1 month ago

Trump's TikTok Dance Continues

ByteDance is reportedly planning a separate standalone TikTok app for the U.S. to address data security concerns and regulatory pressure, which could pave the way for a partial or full monetization event.
US politics
#privacy
fromTechCrunch
1 month ago
Privacy professionals

A rival Tea app for men is leaking its users' personal data and driver's licenses | TechCrunch

fromZDNET
1 month ago
Privacy technologies

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

fromTechCrunch
1 month ago
Privacy professionals

A rival Tea app for men is leaking its users' personal data and driver's licenses | TechCrunch

fromZDNET
1 month ago
Privacy technologies

4 things Proton's privacy-first AI chatbot Lumo can do - and how to try it

Information security
fromMedium
1 month ago

DLP vs. EDR: A Technical Deep Dive Beyond the Acronyms

DLP focuses on protecting sensitive data, while EDR is concerned with detecting and responding to threats on endpoints.
fromWIRED
1 month ago

Inside the Biden Administration's Unpublished Report on AI Safety

Researchers identified 139 novel methods to cause AI systems to misbehave, including generating misinformation and leaking personal data, during a red teaming exercise.
US politics
US politics
fromTechCrunch
1 month ago

OpenAI is practically giving ChatGPT to the government for free | TechCrunch

OpenAI has secured a $1 per agency deal with GSA for ChatGPT Enterprise access for federal agencies.
Miscellaneous
fromTechCrunch
1 month ago

Cohere's new AI agent platform, North, promises to keep enterprise data secure | TechCrunch

Cohere's AI platform North enables private deployments, addressing enterprises' data security concerns while ensuring large language models access useful data.
fromTheregister
1 month ago

MoD taps Aussie AI shop to help prevent data leaks

The MoD faces a complex challenge in managing vast and sensitive datasets in the knowledge that even a single case of data leak or loss can be catastrophic.
EU data protection
Privacy technologies
fromHackernoon
3 years ago

Stop Exposed Secrets from Breaching Your Code Today: 4 Urgent Steps to Protect Your Organization | HackerNoon

Proper secrets management is essential to prevent data breaches and unauthorized access.
fromElectronic Frontier Foundation
1 month ago

No Walled Gardens. No Gilded Cages.

Sometimes technology feels like a gilded cage, and you're not the one holding the key. Most people can't live off the grid, so how do we stop data brokers who track and exploit you for money? Tech companies that distort what you see and hear? Governments that restrict, censor, and intimidate? No one can do it alone, but EFF was built to protect your rights.
Privacy professionals
fromdatabreaches.net
1 month ago

Cencora & The Lash Group reach $40M settlement in data breach class action

Cencora Inc. has agreed to pay $40 million to resolve a class action lawsuit over allegations that it failed to adequately protect sensitive personal information.
Online learning
fromIT Pro
1 month ago

Upcoming webinars not to be missed

IT professionals benefit from attending ActualTech Media's webinars for insights on technology trends and solutions to industry challenges.
Privacy professionals
fromThe Hacker News
1 month ago

Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks

Misconfigurations and vulnerabilities are distinct concepts in SaaS security, both posing different risks that require specific attention.
#ai-privacy
fromFast Company
1 month ago
Privacy professionals

Using ChatGPT or other AI tools? Here's who can see your chat history

AI tools can save conversation records, posing risks to user privacy. Adjust settings and use private modes to mitigate privacy issues.
fromTechCrunch
1 month ago
Privacy technologies

Confident Security, 'the Signal for AI,' comes out of stealth with $4.2M | TechCrunch

Confident Security offers a privacy-focused AI tool that ensures data remains confidential and is not used for AI training or storage.
fromTechCrunch
1 month ago
Privacy technologies

Confident Security, 'the Signal for AI,' comes out of stealth with $4.2M | TechCrunch

Cryptocurrency
fromHackernoon
1 year ago

Defining the Edge: Our Unique Focus on Cross-Language Crypto Challenges | HackerNoon

Transport layer security (TLS) is the most discussed technique, with Cross-Site Scripting (XSS) being a primary concern in data transmission security.
Artificial intelligence
fromInfoQ
1 month ago

Google Apigee Adds Built-in LLM Governance with Model Armor

Google Cloud's Model Armor provides LLM governance through integrated API management with features like prompt validation and output filtering.
Privacy technologies
fromHackernoon
2 months ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
Privacy professionals
fromTechRadar
1 month ago

I am a privacy expert and this is why I believe user personalization is the future of privacy

Personalized marketing raises privacy concerns and necessitates strategic approaches to build consumer trust.
fromThe Verge
1 month ago

Amazon buys Bee AI wearable that listens to everything you say

"Bee makes a $49.99 Fitbit-like device that listens in on your conversations while using AI to transcribe everything that you and the people around you say, allowing it to generate personalized summaries of your days, reminders, and suggestions from within the Bee app."
Gadgets
fromwww.mercurynews.com
1 month ago

Bay Area tech firm claims analyst used her vacation to download trade secrets, after showing insubordinate work attitude'

Green Grid's lawsuit claims Zihan Yuan downloaded confidential files during a personal leave, accessing sensitive company data irrelevant to her job role. The firm seeks damages.
Privacy professionals
US news
fromDatabreaches
1 month ago

Missouri Adopts New Data Breach Notice Law

Missouri's Insurance Data Security Act establishes data security standards for insurers and licensed entities, effective January 1, 2026.
fromIT Pro
1 month ago

IT leaders are facing major work device blind spots - and it's putting security at risk

Nearly a quarter of UK businesses detect unauthorized devices accessing corporate data at least every month, with nearly half having experienced a data breach caused by unmanaged devices during the last year alone.
Privacy professionals
fromIndependent
1 month ago

Dear Vicki: My staff have become over-reliant on AI. How do I get them to use it appropriately?

Employees in advertising are reliant on AI tools for research and idea generation, with concerns about misuse and lack of verification, raising questions around productivity and information security.
Productivity
Gadgets
fromWIRED
1 month ago

How to Limit Galaxy AI to On-Device Processing-or Turn It Off Altogether

Samsung Galaxy AI data is encrypted, but security can never be 100% guaranteed.
fromThe Hacker News
1 month ago

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

"CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS."
Information security
fromwww.independent.co.uk
1 month ago

Hundreds of MoD data breaches revealed as security questions raised after Afghan leak

Over 569 data incidents occurred in the Ministry of Defence in 2023-24, revealing significant concerns about their ability to protect sensitive information securely. This is an increase from 550 incidents the previous year and includes losses of electronic devices and mishandling of protected documents.
UK news
fromComputerworld
1 month ago

How to use Microsoft Teams securely

Microsoft Teams continues to gain ground as a business collaboration tool, in part because Microsoft has tied the meeting and messaging app ever more tightly to the rest of its Microsoft 365 productivity suite over the years.
Privacy professionals
US politics
fromLos Angeles Times
1 month ago

ICE is gaining access to trove of Medicaid records, adding new peril for immigrants

The Trump administration plans to hand over personal data of 79 million Medicaid recipients to immigration officials to track undocumented immigrants.
fromMedium
2 months ago

Ensuring Security in AWS Migration: Best Practices for a Risk-Free Transition

AWS migration offers unparalleled opportunities for scalability, flexibility, and innovation, but security concerns are critical. Without a robust framework, sensitive data can be exposed during migration.
Privacy technologies
UK news
fromwww.bbc.com
1 month ago

Three key questions after Afghan data leak sparked unprecedented secret evacuation

The UK government is relocating Afghans at risk from Taliban retribution, following a data leak that has raised significant security concerns.
Tech industry
fromHackernoon
1 year ago

The HackerNoon Newsletter: Complete Gemini CLI Setup Guide for Your Terminal (7/13/2025) | HackerNoon

Major data breaches teach crucial lessons in backup and security practices.
Machine identities will surpass human users, necessitating a shift in security approaches.
Entry-level job positions are declining, largely due to automation in IT roles.
[ Load more ]