Data Protection

Fabric Cryptography Raises $33 Million for VPU Chip

Fabric Cryptography Raises $33 Million for VPU Chip 2024-08-20 at 15:31 By Ionut Arghire Fabric Cryptography has raised $33 million in Series A funding to create the Verifiable Processing Unit (VPU), a new chip for cryptography. The post Fabric Cryptography Raises $33 Million for VPU Chip appeared first on SecurityWeek. This article is an excerpt […]

React to this headline:

Loading spinner

Fabric Cryptography Raises $33 Million for VPU Chip Read More »

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation 2024-08-13 at 15:16 By Kevin Townsend SecurityWeek speaks to Michael Osborne, CTO of IBM Quantum Safe, for a better understanding of the need for and principles of quantum safe cryptography. The post Post-Quantum Cryptography Standards Officially Announced by NIST – a History and

React to this headline:

Loading spinner

Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation Read More »

Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions

Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions 2024-08-08 at 18:01 By Kevin Townsend In modern security parlance, ‘immutable’ has three primary associations: immutable servers, immutable backup, and immutable data. The post Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Immutability in Cybersecurity: A Layer of Security Amidst Complexity and Misconceptions Read More »

Scaling data security solutions: What you need to know

Scaling data security solutions: What you need to know 2024-08-06 at 07:01 By Mirko Zorz In this Help Net Security interview, Bruno Kurtic, President and CEO at Bedrock Security, discusses the role of data visibility in enhancing cybersecurity. He explains that effective data visibility involves discovering, classifying, and contextualizing data, which helps organizations understand and

React to this headline:

Loading spinner

Scaling data security solutions: What you need to know Read More »

Cloud security threats CISOs need to know about

Cloud security threats CISOs need to know about 2024-07-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, advanced persistent threats, ransomware, API

React to this headline:

Loading spinner

Cloud security threats CISOs need to know about Read More »

Confidential AI: Enabling secure processing of sensitive data

Confidential AI: Enabling secure processing of sensitive data 2024-07-23 at 06:01 By Mirko Zorz In this Help Net Security interview, Anand Pashupathy, VP & GM, Security Software & Services Division at Intel, explains how Intel’s approach to confidential computing, particularly at the silicon level, enhances data protection for AI applications and how collaborations with technology

React to this headline:

Loading spinner

Confidential AI: Enabling secure processing of sensitive data Read More »

Managing cyberattack fallout: Financial and operational damage

Managing cyberattack fallout: Financial and operational damage 2024-07-12 at 07:01 By Mirko Zorz In this Help Net Security, Ashley Harrington, Director of Cybersecurity at Aspida, discusses the impact of cyberattack on business operations and financial health. Beyond immediate disruptions and financial burdens, cyber incident can severely damage a company’s reputation among customers and partners. Can

React to this headline:

Loading spinner

Managing cyberattack fallout: Financial and operational damage Read More »

Tracebit Raises $5 Million for Threat Deception Solution

Tracebit Raises $5 Million for Threat Deception Solution 2024-07-11 at 19:16 By Ionut Arghire London startup Tracebit has raised $5 million in seed funding for its cloud-native threat detection and deception solution. The post Tracebit Raises $5 Million for Threat Deception Solution appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Tracebit Raises $5 Million for Threat Deception Solution Read More »

VMware Patches Critical SQL-Injection Flaw in Aria Automation

VMware Patches Critical SQL-Injection Flaw in Aria Automation 2024-07-10 at 20:01 By Ryan Naraine VMware warns that authenticated malicious users could enter specially crafted SQL queries and perform unauthorized read/write operations in the database. The post VMware Patches Critical SQL-Injection Flaw in Aria Automation appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

VMware Patches Critical SQL-Injection Flaw in Aria Automation Read More »

Brazil Data Regulator Bans Meta From Mining Data to Train AI Models

Brazil Data Regulator Bans Meta From Mining Data to Train AI Models 2024-07-03 at 15:46 By Associated Press Brazil’s national data protection authority has determined that Meta cannot use data originating in the country to train its artificial intelligence. The post Brazil Data Regulator Bans Meta From Mining Data to Train AI Models appeared first

React to this headline:

Loading spinner

Brazil Data Regulator Bans Meta From Mining Data to Train AI Models Read More »

Pyte Raises $5 Million for Secure Data Collaboration Solutions

Pyte Raises $5 Million for Secure Data Collaboration Solutions 2024-06-14 at 10:01 By Eduard Kovacs Pyte has raised $5 million for its secure computation platform, bringing the total investment in the company to $12 million.  The post Pyte Raises $5 Million for Secure Data Collaboration Solutions appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Pyte Raises $5 Million for Secure Data Collaboration Solutions Read More »

Data Security Firm Cyberhaven Raises $88 Million at $488 Million Valuation

Data Security Firm Cyberhaven Raises $88 Million at $488 Million Valuation 2024-06-12 at 19:46 By Eduard Kovacs Data security company Cyberhaven has raised $88 million in a Series C funding round that brings the total to $136 million. The post Data Security Firm Cyberhaven Raises $88 Million at $488 Million Valuation appeared first on SecurityWeek.

React to this headline:

Loading spinner

Data Security Firm Cyberhaven Raises $88 Million at $488 Million Valuation Read More »

GDPR turns six: Expert discusses AI impact

GDPR turns six: Expert discusses AI impact 2024-06-11 at 06:31 By Help Net Security The European Union’s GDPR policy came into effect six years ago. Since then, it has become widely regarded as the standard for data sharing, but the rise of new technology has questioned its suitability and relevance. In this Help Net Security

React to this headline:

Loading spinner

GDPR turns six: Expert discusses AI impact Read More »

Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default

Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default 2024-06-07 at 20:17 By Ryan Naraine Amidst public pressure, Microsoft changes the set-up experience of Copilot+ PCs to disable the controversial Windows Recall feature by default. The post Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Microsoft Bows to Public Pressure, Disables Controversial Windows Recall by Default Read More »

Tenable to Acquire Eureka Security to Boost DSPM Capabilities

Tenable to Acquire Eureka Security to Boost DSPM Capabilities 2024-06-07 at 18:46 By Ryan Naraine Tenable goes shopping again in Israel with plans to buy early stage startup Eureka Security to boost data security posture management tooling. The post Tenable to Acquire Eureka Security to Boost DSPM Capabilities appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Tenable to Acquire Eureka Security to Boost DSPM Capabilities Read More »

Microsoft’s Windows Recall: Cutting-Edge Search Tech or Creepy Overreach?

Microsoft’s Windows Recall: Cutting-Edge Search Tech or Creepy Overreach? 2024-05-30 at 20:31 By Ryan Naraine SecurityWeek editor-at-large Ryan Naraine examines the broad tension between tech innovation and privacy rights at a time when ChatGPT-like bots and generative-AI apps are starting to dominate the landscape.  The post Microsoft’s Windows Recall: Cutting-Edge Search Tech or Creepy Overreach?

React to this headline:

Loading spinner

Microsoft’s Windows Recall: Cutting-Edge Search Tech or Creepy Overreach? Read More »

Transcend Raises $40 Million for Data Privacy Platform

Transcend Raises $40 Million for Data Privacy Platform 2024-05-29 at 18:01 By Ionut Arghire San Francisco data privacy startup Transcend secures 40 million in a Series B funding round that brings the total raised to $90 million. The post Transcend Raises $40 Million for Data Privacy Platform appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Transcend Raises $40 Million for Data Privacy Platform Read More »

Zendata Emerges From Stealth With Data Security, AI Governance Solutions

Zendata Emerges From Stealth With Data Security, AI Governance Solutions 2024-05-29 at 15:16 By Eduard Kovacs Data security and AI governance company Zendata has emerged from stealth mode with $2 million in seed funding. The post Zendata Emerges From Stealth With Data Security, AI Governance Solutions appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Zendata Emerges From Stealth With Data Security, AI Governance Solutions Read More »

Avoiding the cybersecurity blame game

Avoiding the cybersecurity blame game 2024-05-29 at 07:31 By Help Net Security Cyber risk management has many components. Those who do it well will conduct comprehensive risk assessments, enact well-documented and well-communicated processes and controls, and fully implemented monitoring and review requirements. Processes and controls typically comprise policies, which will include detailed explanations of the

React to this headline:

Loading spinner

Avoiding the cybersecurity blame game Read More »

Zoom Adding Post-Quantum End-to-End Encryption to Products

Zoom Adding Post-Quantum End-to-End Encryption to Products 2024-05-21 at 16:46 By Eduard Kovacs Zoom is announcing post-quantum end-to-end encryption on Meetings, with Phone and Rooms coming soon.  The post Zoom Adding Post-Quantum End-to-End Encryption to Products appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Zoom Adding Post-Quantum End-to-End Encryption to Products Read More »

Scroll to Top