data security

When typing becomes tracking: Study reveals widespread silent keystroke interception

When typing becomes tracking: Study reveals widespread silent keystroke interception 2025-09-11 at 09:17 By Mirko Zorz You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, […]

React to this headline:

Loading spinner

When typing becomes tracking: Study reveals widespread silent keystroke interception Read More »

How attackers weaponize communications networks

How attackers weaponize communications networks 2025-09-11 at 08:30 By Mirko Zorz In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range from corporate espionage to geopolitical influence. The discussion

React to this headline:

Loading spinner

How attackers weaponize communications networks Read More »

AI is everywhere, but scaling it is another story

AI is everywhere, but scaling it is another story 2025-09-11 at 08:02 By Anamarija Pogorelec AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas executives need

React to this headline:

Loading spinner

AI is everywhere, but scaling it is another story Read More »

Identity management was hard, AI made it harder

Identity management was hard, AI made it harder 2025-09-08 at 07:33 By Anamarija Pogorelec Identity security is becoming a core part of cybersecurity operations, but many organizations are falling behind. A new report from SailPoint shows that as AI-driven identities and machine accounts grow, most security teams are not prepared to manage them at scale.

React to this headline:

Loading spinner

Identity management was hard, AI made it harder Read More »

AI moves fast, but data security must move faster

AI moves fast, but data security must move faster 2025-09-08 at 07:03 By Anamarija Pogorelec Generative AI is showing up everywhere in the enterprise, from customer service chatbots to marketing campaigns. It promises speed and innovation, but it also brings new and unfamiliar security risks. As companies rush to adopt these tools, many are discovering

React to this headline:

Loading spinner

AI moves fast, but data security must move faster Read More »

How to reclaim control over your online shopping data

How to reclaim control over your online shopping data 2025-09-05 at 09:33 By Sinisa Markovic Online shopping is convenient, saves time, and everything is just a click away. But how often do we stop to think about what happens to the data we leave behind, or the risks that might come with it? Where shopping

React to this headline:

Loading spinner

How to reclaim control over your online shopping data Read More »

File security risks rise as insiders, malware, and AI challenges converge

File security risks rise as insiders, malware, and AI challenges converge 2025-09-05 at 08:42 By Anamarija Pogorelec Breaches tied to file access are happening often, and the costs add up quickly. Many organizations have faced multiple file-related incidents over the last two years, with financial losses stretching into the millions. The fallout often includes stolen

React to this headline:

Loading spinner

File security risks rise as insiders, malware, and AI challenges converge Read More »

Social media apps that aggressively harvest user data

Social media apps that aggressively harvest user data 2025-08-27 at 07:10 By Sinisa Markovic Both domestic and foreign technology companies collect vast amounts of Americans’ personal data through mobile applications, according to Incogni. Some apps leverage data for marketing and advertising purposes, feeding algorithms to calculate optimal prices based on consumer behavior, often leading to

React to this headline:

Loading spinner

Social media apps that aggressively harvest user data Read More »

Product showcase: iStorage datAshur PRO+C encrypted USB flash drive

Product showcase: iStorage datAshur PRO+C encrypted USB flash drive 2025-08-21 at 08:00 By Anamarija Pogorelec The iStorage datAshur PRO+C is a USB-C flash drive featuring AES-XTS 256-bit hardware encryption. Available in capacities from 32 GB to 512 GB, the drive holds FIPS 140-3 Level 3 certification and operates without the need for software, making it

React to this headline:

Loading spinner

Product showcase: iStorage datAshur PRO+C encrypted USB flash drive Read More »

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD 2025-08-13 at 08:31 By Anamarija Pogorelec The Apricorn Aegis NVX is a hardware-based 256-Bit AES XTS external SSD drive with integrated USB-C cable. Its storage capacities range from 500GB to 2TB. The device is OS free and cross-platform compatible. Design and build The drive comes with

React to this headline:

Loading spinner

Product showcase: Apricorn Aegis NVX, a high-security, portable SSD Read More »

CISOs say they’re prepared, their data says otherwise

CISOs say they’re prepared, their data says otherwise 2025-08-06 at 08:02 By Sinisa Markovic Most security teams believe they can act quickly when a threat emerges. But many don’t trust the very data they rely on to do so, and that’s holding them back. A new Axonius report, based on a survey of 500 U.S.-based

React to this headline:

Loading spinner

CISOs say they’re prepared, their data says otherwise Read More »

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC 2025-07-02 at 07:31 By Anamarija Pogorelec The Apricorn Aegis Secure Key 3NXC is a 256-bit AES XTS hardware-encrypted flash drive with a USB-C connector. It is available in storage capacities ranging from 4GB to 512GB and holds FIPS 140-2 Level 3 validation. The device

React to this headline:

Loading spinner

Product showcase: Protect your data with Apricorn Aegis Secure Key 3NXC Read More »

Protecting patient data starts with knowing where it’s stored

Protecting patient data starts with knowing where it’s stored 2025-06-06 at 08:31 By Sinisa Markovic Patient data is often stored or processed outside the country where it was collected. When that happens, the data falls under the laws of the country where it resides. Depending on those laws, local governments may have legal access to

React to this headline:

Loading spinner

Protecting patient data starts with knowing where it’s stored Read More »

Why security teams cannot rely solely on AI guardrails

Why security teams cannot rely solely on AI guardrails 2025-05-12 at 09:19 By Mirko Zorz In this Help Net Security interview, Dr. Peter Garraghan, CEO of Mindgard, discusses their research around vulnerabilities in the guardrails used to protect large AI models. The findings highlight how even billion-dollar LLMs can be bypassed using surprisingly simple techniques,

React to this headline:

Loading spinner

Why security teams cannot rely solely on AI guardrails Read More »

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts 2025-05-08 at 07:02 By Help Net Security Healthcare organizations are facing a growing data security challenge from within, according to a new report from Netskope Threat Labs. The analysis reveals that employees in the sector are frequently attempting to upload sensitive information, including potentially protected

React to this headline:

Loading spinner

Healthcare workers regularly upload sensitive data to GenAI, cloud accounts Read More »

Personal data of top executives easily found online

Personal data of top executives easily found online 2025-05-07 at 07:01 By Help Net Security The personal information of 75% of corporate directors can be found on people search sites, according to Incogni. People search sites claim to reveal a variety of personal details, including public records, phone numbers, and even property values. Home addresses

React to this headline:

Loading spinner

Personal data of top executives easily found online Read More »

Ransomware spike exposes cracks in cloud security

Ransomware spike exposes cracks in cloud security 2025-05-05 at 07:01 By Help Net Security 90% of IT and security leaders said their organization experienced a cyberattack within the last year, according to a report by Rubrik. “Many organizations that move to the cloud assume their providers will handle security,” said Joe Hladik, Head of Rubrik

React to this headline:

Loading spinner

Ransomware spike exposes cracks in cloud security Read More »

The legal blind spot of shadow IT

The legal blind spot of shadow IT 2025-04-22 at 09:36 By Mirko Zorz Shadow IT isn’t just a security risk, it’s a legal one. When teams use unsanctioned tools, they can trigger compliance violations, expose sensitive data, or break contracts. Let’s look at where the legal landmines are and what CISOs can do to stay

React to this headline:

Loading spinner

The legal blind spot of shadow IT Read More »

When companies merge, so do their cyber threats

When companies merge, so do their cyber threats 2025-04-16 at 09:13 By Mirko Zorz For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security

React to this headline:

Loading spinner

When companies merge, so do their cyber threats Read More »

The quiet data breach hiding in AI workflows

The quiet data breach hiding in AI workflows 2025-04-14 at 08:30 By Mirko Zorz As AI becomes embedded in daily business workflows, the risk of data exposure increases. Prompt leaks are not rare exceptions. They are a natural outcome of how employees use large language models. CISOs cannot treat this as a secondary concern. To

React to this headline:

Loading spinner

The quiet data breach hiding in AI workflows Read More »

Scroll to Top