The hidden dangers of low-value data

In this Help Net Security video, Terry Ray, SVP Data Security and Field CTO at Imperva, warns organizations to stop ignoring low-value data – as criminals use it as a place to live, watch, and wait for the perfect moment to steal the crown jewels. Despite data classification being essential to successful data security strategies […]

Continue Reading

75% of education sector attacks linked to compromised accounts

69% of organizations in the education sector suffered a cyberattack within the last 12 months, according to Netwrix. Phishing and account compromise threaten the education sector Phishing and user account compromise were the most common attack paths for these organizations, while phishing and malware (such as ransomware) topped the list for other verticals. What’s more, […]

Continue Reading

5 ways in which FHE can solve blockchain’s privacy problems

Blockchain technology has gained significant traction due to its decentralized nature and immutability, providing transparency and security for various applications, especially in finance. Having gained notoriety during the 2010s with the boom of cryptocurrencies such as Bitcoin, skilled observers quickly identified the technology’s underlying potential to be used as a trusted means of recording value […]

Continue Reading

Data privacy vault: Securing sensitive data while navigating regulatory demands

In this Help Net Security interview, Jean-Charles Chemin, CEO of Legapass, provides insight into the correlation between maintaining customer trust and protecting sensitive customer data. He emphasizes how a data privacy vault can reinforce customer trust by offering protection against data breaches and helping businesses comply with data protection regulations, ultimately leading to customer loyalty […]

Continue Reading

The race against time in ransomware attacks

Most organizations lack strong cyber resilience strategies or data security capabilities to address threats and maintain business continuity, according to BigID. Despite both the rise in threats and the high percentage of respondents whose organizations suffered recent attacks, there hasn’t been a corresponding uptick in strategic measures to shore up cyber resilience. In fact, close […]

Continue Reading

Combatting data governance risks of public generative AI tools

When companies utilize public generative AI tools, the models are refined on input data provided by the company. Regarding data security, unauthorized use of sensitive data or the accidental exposure of proprietary information can lead to reputational damage, legal consequences, and loss of competitive advantage. Companies must carefully assess the data security measures implemented by […]

Continue Reading