sensitive data

dope.security Embeds LLM in CASB to Improve Data Security
dope.security this week added a cloud access security broker (CASB) to its portfolio that identifies any externally shared file and leverages a large language model (LLM) to identify sensitive data ...
Security Boulevard

CHOROLOGY.ai Extends AI Reach to Classify Sensitive Data
CHOROLOGY.ai this week added an Automated Compliance Engine (ACE) to its data security posture management (DSPM) platform that makes use of multiple types of artificial intelligence (AI) to rapidly classify sensitive data ...
Security Boulevard
Linux Backdoor Infection Scare, Massive Social Security Number Heist
Tom Eston | | backdoor, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, government, Government Contractor, Hacking, Information Security, Infosec, Linux, open source, pii, Podcast, Podcasts, Privacy, security, sensitive data, Social Security Numbers, technology, Weekly Edition, XZ Utils
In episode 325, Tom and Kevin discuss a significant backdoor threat that nearly compromised Linux systems globally, stemming from an infiltration into an open-source project called XZ Utils by attackers who gained ...

Why RBAC for Data Reigns Supreme in the Age of Cloud Threats
Sushant Rao, SVP of Marketing | | Data encryption, Data Security, privacy regulations, sensitive data
Not too long ago, we viewed file-level or disk-level encryption for databases as “secure”. However, traditional security measures like at-rest data encryption have shown significant cracks against modern threats. This is where ...
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...
Data Masking for PostgreSQL
Introduction In the ever-evolving landscape of data management, safeguarding sensitive information has become paramount. One of the popular techniques is data masking, a process that obscures original data with fictional or pseudonymous ...

Data sprawl: why application access controls as a security strategy doesn’t work
Laura Case, Director of Product Management | | Data encryption, Data Security, privacy regulations, sensitive data
As enterprises maintain more and more data, there is a greater need to ensure that sensitive data is protected. Privacy regulations are increasing which is fantastic for individuals who want to keep ...

Data Security and Privacy: Your Generative AI Application Doesn’t Need to Know Your Name
A couple of weeks back, I was doing some research on some old mergers and acquisitions in the data security market when I found myself drawing a blank on the name of ...
Data Security in MySQL is an evolving compliance and threat landscape
Min-Hank Ho, VP Product Management | | Data encryption, Data Security, mysql, privacy regulations, sensitive data
MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the ...
Data Security in MySQL is an evolving compliance and threat landscape
Min-Hank Ho, VP Product Management | | Data encryption, Data Security, mysql, privacy regulations, sensitive data
MySQL remains one of the most popular relational databases today. It offers a variety of data security features that can help with compliance, but only for those who purchase and use the ...