Topic: data protection

  • Proofpoint's 4 New Innovations to Secure the Future of Work

    Proofpoint's 4 New Innovations to Secure the Future of Work

    The rise of the agentic workspace, where humans and AI agents collaborate, introduces new security challenges that require a fresh, human-centric security approach. Proofpoint has launched innovations to protect AI interactions, including Prime Threat Protection to block malicious prompt injectio...

    Read More »
  • Secure Your Phone Abroad: How 1Password's Travel Mode Protects Your Data

    Secure Your Phone Abroad: How 1Password's Travel Mode Protects Your Data

    US Customs and Border Protection is conducting a record number of electronic device searches, raising privacy concerns for travelers and leading to potential detentions or denied entries based on digital content. 1Password's Travel Mode offers a solution by allowing users to hide sensitive vaults...

    Read More »
  • ADGM Unveils New Public Interest Rules to Boost Data Protection

    ADGM Unveils New Public Interest Rules to Boost Data Protection

    ADGM has introduced new data protection regulations that provide clear guidelines for processing sensitive personal data in the public interest, particularly in sectors like insurance and education. The regulations include specific conditions and safeguards for handling sensitive data without con...

    Read More »
  • DataLocker Enhances Security with DL GO & MySafeConsole

    DataLocker Enhances Security with DL GO & MySafeConsole

    DataLocker has launched the DL GO encrypted USB drive and MySafeConsole cloud platform, offering enterprise-level security features at an accessible price for individuals and small businesses. The DL GO drive uses AES-256 XTS hardware encryption, supports biometric authentication, and has a rugge...

    Read More »
  • Commvault Revolutionizes Cyberattack Recovery

    Commvault Revolutionizes Cyberattack Recovery

    Commvault's Cleanroom Recovery and Cloud Rewind platforms enable secure, isolated testing and rapid restoration of data and entire cloud applications to combat cyberattacks. An independent study validates that Commvault's solutions reduce recovery times by 99%, accelerate infrastructure rebuildin...

    Read More »
  • Xage Fabric: Secure Your Data from Unauthorized Access

    Xage Fabric: Secure Your Data from Unauthorized Access

    Businesses face significant security challenges when adopting AI, including data breaches and unauthorized access, which traditional measures often fail to address effectively. Xage Security has introduced a zero trust platform designed specifically for AI environments, offering identity-centric,...

    Read More »
  • Liquid C2 & AvePoint Partner to Accelerate Africa's Cloud Transformation

    Liquid C2 & AvePoint Partner to Accelerate Africa's Cloud Transformation

    A strategic partnership between Liquid C2’s Cloudmania and AvePoint aims to accelerate secure cloud adoption across Africa by integrating advanced data protection and governance tools. The collaboration enhances Cloudmania’s Microsoft-based offerings, providing businesses with improved security, ...

    Read More »
  • Urgent: Change Your Plex Password Now

    Urgent: Change Your Plex Password Now

    Plex has experienced a security breach where an unauthorized party accessed customer data, including email addresses, usernames, and securely hashed passwords. The company has addressed the vulnerability and recommends users immediately reset their passwords and enable two-factor authentication f...

    Read More »
  • AI SSD Subscription Fights Ransomware at Hardware Level

    AI SSD Subscription Fights Ransomware at Hardware Level

    Flexxon has launched the X-Phy Guard Solution, an AI-integrated SSD designed as a final defense against cyberattacks like ransomware, targeting high-security sectors with a subscription starting at $249 annually. The drive's AI engine monitors for threats such as encryption patterns and physical ...

    Read More »
  • Trump Approves $14B TikTok Deal, Cedes 80% to US Investors

    Trump Approves $14B TikTok Deal, Cedes 80% to US Investors

    President Trump approved a $14 billion deal transferring 80% ownership of TikTok's U.S. operations to American investors, addressing national security concerns and ensuring the app's future in the country. The agreement reduces Chinese parent company ByteDance's stake to 19.9% and includes safegu...

    Read More »
  • AI's Speed Demands Faster Data Security Now

    AI's Speed Demands Faster Data Security Now

    Generative AI is being rapidly adopted by businesses for innovation, but it introduces significant data security challenges, especially concerning data integrity and confidentiality. The reliance on high-quality data makes AI systems vulnerable to integrity-based threats, such as data tampering, ...

    Read More »
  • GDPR Training: Turn Compliance into Competitive Advantage

    GDPR Training: Turn Compliance into Competitive Advantage

    Despite significant investment in GDPR compliance, many businesses struggle with employee security practices, risking heavy fines and reputational damage. Effective training requires role-specific, continuous education that integrates practical tools like password managers to foster lasting behav...

    Read More »
  • Global Compliance Strategy: A Cross-Border Blueprint

    Global Compliance Strategy: A Cross-Border Blueprint

    Global compliance requires a forward-thinking strategy that integrates data protection with operational efficiency to avoid penalties and build trust. An ideal compliance platform must blend rigorous data protection with user-friendly design, ensuring scalability and adherence to international re...

    Read More »
  • F5 Acquires CalypsoAI to Secure Generative AI Systems

    F5 Acquires CalypsoAI to Secure Generative AI Systems

    F5 is acquiring CalypsoAI for $180 million to enhance its security offerings with specialized capabilities for protecting generative AI systems against emerging threats. The acquisition aims to integrate CalypsoAI's technology into F5's platform, providing real-time threat defense, data security,...

    Read More »
  • Cloudflare Balances Data Security with AI Access

    Cloudflare Balances Data Security with AI Access

    Cloudflare One has been enhanced to help businesses securely integrate and manage generative AI tools while maintaining data protection and compliance standards. New features include AI Security Posture Management (AI-SPM), offering discovery of AI usage patterns, protection against unapproved AI...

    Read More »
  • Veeam Appliance: Enhanced Data Protection Solutions

    Veeam Appliance: Enhanced Data Protection Solutions

    Veeam Software has introduced a fully pre-built and pre-hardened software appliance that eliminates manual setup, OS patching, and Windows licensing, offering a secure, ready-to-use data protection platform. The hardware-agnostic appliance can be deployed across physical, virtual, or cloud enviro...

    Read More »
  • Enhance Security with Netskope UZTNA's Dynamic Policy Controls

    Enhance Security with Netskope UZTNA's Dynamic Policy Controls

    Netskope's Universal ZTNA platform now integrates Private Access and Device Intelligence, offering deeper threat inspection and enabling businesses to replace outdated technologies like VPNs and NACs. The solution extends protection to IoT and OT devices with built-in device intelligence and embe...

    Read More »
  • Tunisie Telecom Secures ISO 27001:2022 for Enhanced Data Security

    Tunisie Telecom Secures ISO 27001:2022 for Enhanced Data Security

    Tunisie Telecom has achieved ISO/IEC 27001:2022 certification for its Information Security Management System, validated by TÜV Rheinland, highlighting its commitment to top-tier security protocols. The certification applies to all processes of the Customer Relations Directorate, ensuring customer...

    Read More »
  • Imgur Blocks UK Users in Surprise Geo-Ban

    Imgur Blocks UK Users in Surprise Geo-Ban

    Imgur has blocked all access for UK users, preventing them from logging in, viewing, or uploading content as of September 30, 2025, following a warning from the UK's data protection authority. The UK's Information Commissioner’s Office is investigating Imgur over its handling of children's data a...

    Read More »
  • Kuwait Accelerates Digital Shift with Google Cloud Alliance

    Kuwait Accelerates Digital Shift with Google Cloud Alliance

    Kuwait has formed a strategic partnership with Google Cloud, endorsed by the government, to modernize its digital infrastructure and accelerate its shift to a knowledge-based economy. The collaboration emphasizes that cloud computing is critical for national growth and digital transformation, whi...

    Read More »
  • Beware 'Evil Twin' Wi-Fi: Experts Warn of Security Risks

    Beware 'Evil Twin' Wi-Fi: Experts Warn of Security Risks

    Public Wi-Fi networks often lack encryption, making users vulnerable to data interception and malicious attacks, with thousands of breaches reported this year. Hackers use tactics like snooping and "evil twin" networks to capture sensitive information, such as passwords and financial details, fro...

    Read More »
  • Datadog Secures IRAP Protected Status in Australia

    Datadog Secures IRAP Protected Status in Australia

    Datadog has achieved IRAP Protected status in Australia, certifying its compliance with stringent security standards for handling sensitive workloads in the public sector and regulated industries. The certification covers Datadog's full suite of observability and security tools, including Infrast...

    Read More »
  • Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program

    Go Beyond Checklists: Build a Mature Automotive Cybersecurity Program

    A mature automotive cybersecurity program requires a foundation in established frameworks like ISO, but must go beyond compliance by developing a tailored risk management strategy that addresses unique threats and deploys proactive controls across the enterprise. Comprehensive threat visibility, ...

    Read More »
  • Google's AI Ransomware Defense Has Critical Limits

    Google's AI Ransomware Defense Has Critical Limits

    Google has introduced an AI-powered defense for its Drive desktop application that detects ransomware behavior in real-time and stops cloud synchronization to prevent widespread infection. This feature acts as a supplementary security layer, using an AI model trained on millions of ransomware-enc...

    Read More »
  • Macquarie & Netskope: Simplified Network, Cloud & AI Security for Australia

    Macquarie & Netskope: Simplified Network, Cloud & AI Security for Australia

    Macquarie Telecom and Netskope have formed a strategic alliance to offer a unified Secure Access Service Edge (SASE) solution, combining SD-WAN with advanced security for cloud and AI environments. The integrated platform provides comprehensive threat protection, cost savings, and compliance with...

    Read More »
  • Coro 3.6: Simplify Operations for Resource-Strapped SMBs

    Coro 3.6: Simplify Operations for Resource-Strapped SMBs

    Coro has launched Coro 3.6, an AI-driven security platform designed to help small and medium-sized businesses strengthen cybersecurity without needing extensive IT resources. The platform integrates all security functions into a unified system, automatically analyzing and correlating threats to r...

    Read More »
  • Discord Data Breach Exposes 70,000 Users' Government IDs

    Discord Data Breach Exposes 70,000 Users' Government IDs

    Discord clarified that a recent security incident was not a breach of its own systems but originated from a third-party customer support vendor, and it refuted the scale of the incident as part of an extortion attempt. Approximately 70,000 users had their government-issued ID photos potentially e...

    Read More »
  • Top Infosec Products Launched This Week: September 12, 2025

    Top Infosec Products Launched This Week: September 12, 2025

    Several leading vendors launched innovative security tools this week, addressing key areas such as vendor risk management, data encryption, threat detection, and AI governance. Cynomi's TPRM platform significantly reduces vendor assessment times by up to 79%, boosting operational efficiency and p...

    Read More »
  • Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland Boosts IT with Macquarie Telecom

    Cancer Council Queensland has partnered with Macquarie Telecom to enhance its IT infrastructure, enabling the charity to focus more resources on cancer research, prevention, and patient care. The partnership includes a secure SD-WAN and SASE framework, along with cybersecurity upgrades like SOC a...

    Read More »
  • PwC: AI Leads Cybersecurity Spending as Top Priority

    PwC: AI Leads Cybersecurity Spending as Top Priority

    Artificial intelligence is now the top cybersecurity spending priority for businesses, reflecting a strategic shift toward AI-driven defense mechanisms against evolving digital threats. AI-based security solutions lead budget priorities at 36%, surpassing other areas like cloud security and netwo...

    Read More »
  • Australian Clinical Labs Fined for Medlab Pathology Data Breach

    Australian Clinical Labs Fined for Medlab Pathology Data Breach

    Australian Clinical Labs was fined $5.8 million for a 2022 data breach affecting over 223,000 people, marking the first civil penalties issued under the Privacy Act 1988. The penalties were imposed for failing to protect personal information, assess the breach promptly, and report it to the Commi...

    Read More »
  • Get FREE Cybersecurity For Dummies, 3rd Edition eBook Now

    Get FREE Cybersecurity For Dummies, 3rd Edition eBook Now

    The digital world faces constant sophisticated cyber threats like ransomware, data breaches, and social engineering scams, posing risks to individuals and organizations. "Cybersecurity For Dummies, 3rd Edition" by Joseph Steinberg offers clear, practical advice on personal and organizational secu...

    Read More »
  • Amazon's Quick Suite: Your New AI Teammate Rivals ChatGPT

    Amazon's Quick Suite: Your New AI Teammate Rivals ChatGPT

    Amazon Quick Suite is an enterprise AI platform that centralizes data from various sources like Google Drive, Salesforce, and Slack, enabling users to interact with their information through natural language queries. The platform offers advanced automation features, including Quick Flows for desi...

    Read More »
  • Top Infosec Products Launched This Week: October 2025

    Top Infosec Products Launched This Week: October 2025

    NowSecure launched a Privacy solution to detect and fix systemic vulnerabilities in mobile applications, helping organizations prevent unauthorized data leakage. Acronis integrated automated patch management for Windows and AI-driven threat detection into its True Image 2026 backup software to en...

    Read More »
  • Cyber-Attacks Hit Three French Regional Healthcare Agencies

    Cyber-Attacks Hit Three French Regional Healthcare Agencies

    A coordinated cybersecurity breach compromised personal data of patients in multiple French regions, though medical records remained secure. Attackers used stolen credentials to impersonate healthcare professionals and access systems via regional e-health platforms. Authorities are taking action ...

    Read More »
  • 36 New Tech Unicorns Emerged in 2025 So Far

    36 New Tech Unicorns Emerged in 2025 So Far

    In 2025, 36 new unicorn startups emerged across diverse sectors like AI, robotics, healthcare, fintech, and space tech, each surpassing $1 billion valuations. Notable unicorns included Linear ($1.25B), Gecko Robotics ($1.62B), and Thinking Machines ($10B), with AI, healthcare, and fintech driving...

    Read More »
  • Top Cybersecurity Jobs Hiring Now: August 26, 2025

    Top Cybersecurity Jobs Hiring Now: August 26, 2025

    The global demand for skilled cybersecurity professionals is rising across diverse industries, including construction, retail, finance, and government, offering opportunities at all career levels. Numerous organizations worldwide are actively hiring for a variety of cybersecurity roles, ranging f...

    Read More »
  • TRA Bahrain, Mobile Operators Launch Anti-SMS Fraud Guidelines

    TRA Bahrain, Mobile Operators Launch Anti-SMS Fraud Guidelines

    Bahrain's TRA and mobile operators have launched new "Guidelines for Reducing Fraudulent SMS" to combat scam messages and enhance mobile security nationwide. The guidelines establish technical and operational measures for identifying and intercepting fraudulent communications, alongside public ed...

    Read More »
  • UK Renews Push Against Apple Encryption

    UK Renews Push Against Apple Encryption

    The UK government has renewed demands for Apple to provide special access to encrypted iCloud user data, specifically targeting British citizens' backups, reversing earlier indications that the effort was dropped. Despite previous reports that the UK had dropped the mandate due to US pressure and...

    Read More »
  • Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack

    Cisco ASA Zero-Day & Fortra GoAnywhere Under Active Attack

    A wave of sophisticated cyberattacks is exploiting newly discovered zero-day vulnerabilities in critical enterprise infrastructure, including Cisco's ASA and Fortra's GoAnywhere, posing significant risks to organizational networks and sensitive data. Law firms are increasingly targeted by cybercr...

    Read More »
  • Lenovo's AI Solutions: Enterprise Power for SMBs

    Lenovo's AI Solutions: Enterprise Power for SMBs

    Lenovo has launched a suite of IT infrastructure solutions designed specifically for small and medium businesses (SMBs) to help them deploy, scale, and leverage AI technology quickly with pre-validated bundles and flexible pricing. The offerings include AI-ready, enterprise-grade technology such ...

    Read More »
  • Why Europe Needs More AI Talent: Founders' Insights

    Why Europe Needs More AI Talent: Founders' Insights

    Europe is at a critical juncture to lead in AI by leveraging its industrial expertise and research legacy, but must act decisively to develop and deploy homegrown solutions to avoid dependency on foreign technologies. Despite pioneering key AI innovations like convolutional neural networks and LS...

    Read More »
  • Unlock Cyber Resilience: Security Awareness Month 2025

    Unlock Cyber Resilience: Security Awareness Month 2025

    Cybersecurity Awareness Month emphasizes the need for collective digital defense as identity-based attacks, accounting for nearly 80% of incidents, exploit compromised credentials to bypass traditional perimeter security. Adopting zero trust principles, such as least privilege and just-in-time ac...

    Read More »
  • Renault Notifies Customers of Supply Chain Data Breach

    Renault Notifies Customers of Supply Chain Data Breach

    Renault experienced a data breach through a third-party supplier, exposing personal details like names, contact information, and vehicle data, but its internal systems were not compromised. The stolen information increases the risk of targeted phishing attacks, prompting Renault to warn customers...

    Read More »
  • Absolute Security Rehydrate: Restore Compromised Endpoints Fast

    Absolute Security Rehydrate: Restore Compromised Endpoints Fast

    Absolute Security's Rehydrate enables businesses to remotely restore compromised endpoints at scale, often in under 30 minutes, reducing downtime and maintaining operational continuity during cyber incidents. The tool automates recovery with a single click, restoring devices to a fully functional...

    Read More »
  • Discord Data Breach Exposes User Info and Photo IDs

    Discord Data Breach Exposes User Info and Photo IDs

    A security breach at Discord's third-party customer support vendor exposed limited user information including email addresses and partial payment details, though Discord's own systems remained secure. The compromised data includes support ticket information such as names, usernames, and the last ...

    Read More »
  • Discord Data Breach Exposed in Third-Party Hack

    Discord Data Breach Exposed in Third-Party Hack

    Discord experienced a security breach through a third-party customer service provider, exposing sensitive user data in a ransomware attack. Compromised information includes user names, email addresses, partial billing details, support messages, and some government ID images, but passwords and ful...

    Read More »