#data-security

[ follow ]
fromTechRadar
55 minutes ago

I am a privacy expert and this is why I believe user personalization is the future of privacy

Personalized content is a standard for online marketing, raising questions about data origin and consumer consent. Two-thirds of smartphone users are concerned about privacy.
Privacy professionals
#privacy
#china
#cybersecurity
Privacy professionals
fromTechRadar
1 month ago

Top US dental firm spills over 8 million user files online

A massive unsecured database exposed millions of dental records, stressing the importance of cloud security awareness.
Dental marketing agency may be linked to the unsecured data breach.
Marketing tech
fromTechzine Global
1 month ago

Hacking group steals Salesforce data by impersonating IT support

The hacker group UNC6040 exploits voice phishing to gain credentials and access to Salesforce from employees in large organizations.
Information security
fromNextgov.com
1 month ago

US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers

Comcast and Digital Realty are possibly compromised by the Chinese hacking group Salt Typhoon, posing risks to U.S. infrastructure.
fromHackernoon
6 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

Privacy professionals
fromTechRadar
1 month ago

Top US dental firm spills over 8 million user files online

A massive unsecured database exposed millions of dental records, stressing the importance of cloud security awareness.
Dental marketing agency may be linked to the unsecured data breach.
Marketing tech
fromTechzine Global
1 month ago

Hacking group steals Salesforce data by impersonating IT support

The hacker group UNC6040 exploits voice phishing to gain credentials and access to Salesforce from employees in large organizations.
Information security
fromNextgov.com
1 month ago

US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers

Comcast and Digital Realty are possibly compromised by the Chinese hacking group Salt Typhoon, posing risks to U.S. infrastructure.
fromHackernoon
6 months ago
Startup companies

Bedrock Security Cofounder and CEO on Why Security Must Start with Data Visibility | HackerNoon

#corporate-governance
fromwww.mercurynews.com
1 day ago
Privacy professionals

Bay Area tech firm claims analyst used her vacation to download trade secrets, after showing insubordinate work attitude'

fromwww.mercurynews.com
1 day ago
Privacy professionals

Bay Area tech firm claims analyst used her vacation to download trade secrets, after showing insubordinate work attitude'

fromComputerworld
1 day ago

As AI agents go mainstream, companies lean into confidential computing for data security

"Confidential computing creates a hardware boundary in which AI models and data are locked. Information is released only to those models and agents with proper access to prevent unauthorized use of protected data."
Privacy technologies
#compliance
fromMedium
1 week ago
Privacy technologies

Ensuring Security in AWS Migration: Best Practices for a Risk-Free Transition

fromMedium
1 week ago
Privacy technologies

Ensuring Security in AWS Migration: Best Practices for a Risk-Free Transition

fromIndependent
2 days ago

Dear Vicki: My staff have become over-reliant on AI. How do I get them to use it appropriately?

Employees in advertising are reliant on AI tools for research and idea generation, with concerns about misuse and lack of verification, raising questions around productivity and information security.
Productivity
fromWIRED
2 days ago

How to Limit Galaxy AI to On-Device Processing-or Turn It Off Altogether

Samsung ensures all Galaxy AI data is encrypted and protected against unauthorized access. However, no security is foolproof at all times.
Gadgets
fromThe Hacker News
2 days ago

Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers

"CrushFTP 10 before 10.8.5 and 11 before 11.3.4_23, when the DMZ proxy feature is not used, mishandles AS2 validation and consequently allows remote attackers to obtain admin access via HTTPS."
Information security
fromwww.independent.co.uk
4 days ago

Hundreds of MoD data breaches revealed as security questions raised after Afghan leak

Over 569 data incidents occurred in the Ministry of Defence in 2023-24, revealing significant concerns about their ability to protect sensitive information securely. This is an increase from 550 incidents the previous year and includes losses of electronic devices and mishandling of protected documents.
UK news
fromComputerworld
4 days ago

How to use Microsoft Teams securely

Microsoft Teams continues to gain ground as a business collaboration tool, in part because Microsoft has tied the meeting and messaging app ever more tightly to the rest of its Microsoft 365 productivity suite over the years.
Privacy professionals
fromTechCrunch
5 days ago

Confident Security, 'the Signal for AI,' comes out of stealth with $4.2M | TechCrunch

"The second that you give up your data to someone else, you've essentially reduced your privacy," Jonathan Mortensen, founder and CEO of Confident Security, told TechCrunch. "And our product's goal is to remove that trade-off."
Privacy technologies
#ai
fromZDNET
1 month ago
Artificial intelligence

Red Hat Summit 2025 goes beyond the hype, towards practical AI

fromBusiness Insider
3 weeks ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

fromZDNET
1 month ago
Artificial intelligence

Red Hat Summit 2025 goes beyond the hype, towards practical AI

fromBusiness Insider
3 weeks ago
NYC startup

BI revealed that Scale AI exposed sensitive data about Big Tech clients. Now, the company says it's taking action.

#uk-government
#tiktok
EU data protection
fromIrish Independent
1 month ago

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
EU data protection
fromIrish Independent
1 month ago

Social media giant TikTok wins 'stay' on order banning data transfers to China

TikTok secures interim stay until October to challenge DPC decision risking €530m fine.
TikTok claims billions in potential losses if the DPC order stands.
#generative-ai
fromWIRED
1 week ago

McDonald's AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Who Tried the Password '123456'

Carroll and Curry discovered that simple web-based vulnerabilities-including guessing one laughably weak password-allowed them to access a Paradox.ai account and query the company's databases that held every McHire user's chats with Olivia.
Privacy technologies
fromIT Pro
1 week ago

26 million CVs were exposed when a recruiting software firm left a misconfigured Azure container open - cybersecurity experts warn it's an easy mistake that's becoming far too common

The detailed personal information in the exposed resumes enables attackers to conduct highly targeted phishing campaigns.
Privacy technologies
fromBusiness Matters
2 weeks ago

Data Security Posture Management - The Next Big Data Solution Your Business Needs (And How to Get Started)

Data security posture management (DSPM) offers a solution to effectively manage the increasing volume of data, ensuring a unified view and compliance across platforms.
Data science
#artificial-intelligence
fromZDNET
3 weeks ago

How proxy servers actually work, and why they're so valuable

A proxy server sits between your computer and a remote computer, acting on behalf of your machine and providing IP address anonymity during transactions.
Privacy technologies
fromInfoWorld
3 weeks ago

Three steps to boost Amazon S3 data security

Audit identities with SSE-C privileges, remove inactive accounts and unnecessary privileges. This keeps sensitive data safe from unauthorized access and potential breaches.
Privacy professionals
#data-breach
fromDatabreaches
3 weeks ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

fromDatabreaches
3 weeks ago
Privacy professionals

Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected

fromForbes
3 weeks ago

19 Common IT Inventory Mistakes In Remote Workplaces

"Without tokenized IDs linked to each device, IT teams lack real-time visibility, leading to lost assets and security risks, especially with remote teams."
Remote teams
fromwww.housingwire.com
3 weeks ago

Reducing risk: Safely disposing of old electronics

E-waste contains hazardous substances that pose serious threats to the environment and public health if discarded improperly.
Real estate
fromDevOps.com
3 weeks ago

App Migration: How to Build a Winning Risk Management Plan - DevOps.com

Due to various reasons (human error, data incompatibility, etc.), some corporate data can be corrupted or lost during the migration process, which can lead to operational disruptions.
Software development
fromTheregister
3 weeks ago

Glasgow council yanks services offline amid attack cleanup

The council's ICT supplier CGI discovered malicious activity on servers managed by a third-party supplier, leading to widespread disruption of digital services.
London politics
fromTechzine Global
4 weeks ago

Thales covers data security entirety thanks to Imperva

"Thales had strong hardware security modules and data encryption solutions, but more is needed," explains Steven Maas, highlighting the necessity for comprehensive data security solutions.
Information security
#ai-integration
fromMarTech
1 month ago
Marketing tech

HubSpot's ChatGPT connector generates excitement and some concerns | MarTech

fromMarTech
1 month ago
Marketing tech

HubSpot's ChatGPT connector generates excitement and some concerns | MarTech

fromTheregister
1 month ago

Microsoft brings 365 suite on-prem as part of sovereign push

Microsoft 365 Local enables customers to deploy Microsoft productivity workloads like Exchange Server and SharePoint Server in their own datacenters or sovereign cloud environments - with full control on security, compliance and governance.
European startups
fromwww.npr.org
1 month ago

Top House Democrat asks Microsoft about DOGE code allegedly tied to NLRB data removal

Rep. Stephen Lynch has expressed serious concerns regarding potential data obfuscation efforts by the DOGE team, which may have involved deleting logs and sending large data sets out of the NLRB system.
US news
#startup-funding
#digital-sovereignty
European startups
fromHackernoon
1 month ago

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
fromZDNET
1 month ago
Germany news

Yet another European government is ditching Microsoft for Linux - here's why

European startups
fromHackernoon
1 month ago

AWS to Launch European Sovereign Cloud with 7.8B Investment by 2025 | HackerNoon

AWS is launching a European Sovereign Cloud to meet EU digital sovereignty demands by the end of 2025.
fromZDNET
1 month ago
Germany news

Yet another European government is ditching Microsoft for Linux - here's why

#fca
fromComputerworld
1 month ago
Marketing tech

Salesforce changes Slack API terms to block bulk data access for LLMs

Slack has changed its API terms to prohibit LLM training on its data, impacting data discovery efforts across organizations.
fromWIRED
1 month ago

Senators Warn DOGE's Social Security Administration Work Could Break Benefits

Put simply, DOGE has already limited access to benefits by damaging SSA's technological infrastructure-and this rushed IT modernization plan can only exacerbate those problems.
SF politics
fromLondon Business News | Londonlovesbusiness.com
1 month ago

M&S resumes online orders two months after cyber attack - London Business News | Londonlovesbusiness.com

Marks & Spencer's return to online orders comes after a significant cyber attack that disrupted its operations and compromised customer data.
Online marketing
fromSecuritymagazine
1 month ago

The Security Risk No One Talks About During Layoffs: Offboarding

Inconsistent offboarding processes increase insider threats in organizations post-layoff.
Remote teams
fromAmazon Web Services
1 month ago

How Kepler democratized AI access and enhanced client services with Amazon Q Business | Amazon Web Services

Our commitment to clarity and security drives our operations, taking inspiration from Johannes Kepler to illuminate the path for our Fortune 500 clients.
Marketing tech
fromTheregister
1 month ago
Artificial intelligence

Schneier to House: AI fawning obscures security concerns

Bruce Schneier highlights risks of AI in government, warning against negligence in data handling by DOGE and public enthusiasm for AI technology.
fromTechzine Global
1 month ago

Data Lifecycle Management: The Overlooked Step of Secure Deletion

Data Lifecycle Management is essential for safeguarding sensitive information throughout its lifecycle, particularly during secure deletion.
Digital life
Privacy professionals
fromInfoQ
1 month ago

Have I Been Pwned 2.0 Adds New Tools for Data Breach Monitoring

Have I Been Pwned introduces a redesigned front-end to enhance user experience and address evolving needs for improved breach monitoring.
[ Load more ]