The rapid adoption of AI tools across businesses has opened new doors for productivity and innovation. But these advancements bring significant risks. When employees use AI tools without proper safeguards, sensitive company data can leak into the wrong hands. This is where an AI firewall becomes essential. What exactly is an AI firewall? An AI […]
Data security news & resources

Security training is failing. Here’s what really works.
Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

AI and the new era of credentials theft
Despite what Hollywood might suggest, most data breaches don’t involve elite hackers cracking firewalls with lines of code. In reality, all it often takes is one stolen password. Just look at the Samsung breach last month—hackers used compromised credentials to access the personal data of over 270,000 customers. This kind of incident isn’t rare. In […]

Human risk management: the key to mitigating account takeover attacks
Account takeover (ATO) attacks are rising year after year, despite organizations investing heavily in multi-factor authentication. The reason? Cybercriminals’ tactics are evolving—and MFA is no match. Just take last month’s phishing attack targeting Microsoft ADFS. Hackers sent fake IT emails, tricking employees into logging into a cloned ADFS page. The moment victims entered their credentials […]

What are the security risks of DeepSeek?
The Chinese firm DeepSeek has officially entered the AI arena. When the company released its latest iteration in January of this year, it reached 16 million downloads in just 18 days—nearly double the 9 million downloads achieved by OpenAI’s ChatGPT at launch. Chances are, DeepSeek is already being used in your workplace, quietly boosting employee […]

How to build a human firewall in the cloud
As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months. While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]

Generative AI: The ultimate insider threat?
Generative AI tools like ChatGPT and Bard are taking the world by storm—at a rate faster than security teams can keep up. Today, 78% of knowledge workers use third-party GenAI tools. Yet, just a third of organizations say they have defined guidelines on AI usage in place. As more and more corporate data flows into […]

DSPM with DDR capabilities: The complete solution for modern data protection
In today’s world of constant data sharing and AI adoption, organizations face more complex threats than ever before. Traditional security tools simply can’t keep up. That’s why leading security teams are turning to data security posture management (DSPM) with data detection and response (DDR) capabilities—a powerful combination that provides both visibility and active protection. Why […]

DSPM vs CSPM: Why data security posture management is the future of cloud protection
As organizations move more operations to the cloud, security teams face a critical question: Is cloud security posture management (CSPM) enough, or do you need data security posture management (DSPM) too? The answer might surprise you. Understanding the difference: CSPM vs DSPM Cloud security posture management (CSPM) focuses on checking cloud infrastructure settings against security […]

SaaS security posture management: The missing link in your security strategy
Organizations are embracing SaaS applications at a lightning pace. But while these tools are excellent for driving collaboration and productivity, they also create significant blind spots in your security posture. With sensitive data flowing freely across platforms like Slack, Google Workspace, and Microsoft 365, traditional security approaches are simply no longer enough to prevent data […]

CMMC compliance made simple: How data security posture management streamlines your journey
For defense contractors and suppliers working with the Department of Defense, CMMC compliance is no longer optional—it’s a necessity. But with sensitive data flowing through multiple SaaS platforms, many organizations struggle with knowing where to start. The good news? Achieving CMMC compliance doesn’t have to be complicated. You just need the right tools in place. […]