data

The Hidden Dangers of Browser Extensions: Where Google’s MV3 Still Fall Short
A recent Forbes article by Davey Winder discussed a brilliant publication by Stanford researchers Sheryl Hsu, Manda Tran and Aurore Fass. It was discovered nearly 350 million Chrome extensions installed had privacy ...

Looking Toward U.S. Federal Privacy Regulation, How Software Companies can Prepare
Software developers, as key players in the digital ecosystem, must proactively adapt to these changes to ensure compliance and uphold the privacy rights of users ...

Snyk Allies With Snowflake to Improve Data Security
Snyk and Snowflake have allied to make it simpler for cybersecurity teams to analyze the security posture of their IT environments using data hosted in the cloud ...

Missing Guardrails, a Troubling Trend in Data Protection
An estimated 2.7 billion personal records were stolen from National Public Data (NPD), a Florida-based data broker company that collects and sells personal data for background checks ...

Survey Surfaces Widespread Mishandling of Sensitive Data
Perforce Software today published a survey of 250 IT professionals that finds the amount of sensitive data residing in non-production environments is rising as organizations embrace artificial intelligence (AI) and digital business ...

DSPM: A Cybersecurity Approach Tailor-Made for This AI Era
As AI adoption grows, so does organizations’ appetite for the vast data from disparate sources needed to train AI models. Because of this, companies are grappling with how to safeguard a surging ...

Survey Finds Confidence in Data Security Despite Ransomware Scourge
A survey of 322 IT and security professionals finds nearly two-thirds (63%) have confidence in the effectiveness of their organization’s data security measures with another 30% uncertain despite the volume of breaches ...

Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
The Value of HR in Your Insider Risk Management Program
Companies hire people, and while every one of those individuals presents a potential risk, not all (hopefully none) will manifest as an insider threat to the company. As a human challenge, one ...

Criminals are Easily Bypassing Passkeys – How Organizations Can Stay Safe
The problems with passwords drive the interest to adopt newer authentication methods, like passkeys, a type of passwordless technology ...