US cannabis brand, Stiiizy, is in the spotlight this week for all the wrong reasons, after it submitted a data breach notification to California’s attorney general. The contents of the filing detail a shocking data breach: an organized cybercrime group stole troves of sensitive data from the company in November 2024, getting away with confidential […]
Data security news & resources
Why data breach costs will reach new heights in 2025
In 2024, the average cost of a data breach soared to $4.88 million—a 10% increase over the previous year. This year, analysis indicates we will see the same percentage increase again, teetering over the $5 million mark. Obviously, this is an insane amount of money—an amount that would put many organizations out of business. So, […]
Securing the cloud: DPSM use cases
DSPM may be the latest buzzword in cybersecurity, but what does it actually do? How does it protect your data in the cloud? In this post, we’ll break down the key use cases of data security posture management (DSPM) to help you understand how this emerging technology works. Defining data security posture management (DSPM) Data […]
The crypto startup’s guide to data security
“Fail forward” might be the mantra amongst crypto startups, but when it comes to data security, mistakes can come with a devastating price tag. Over the past year, the average cost of a data breach surged to $4.8 million per incident, highlighting just how high the stakes are. Sure, making mistakes is part of the […]
Human-AI teaming: The cure for overwhelmed SOCs
Burnout among security leaders and professionals is reaching unprecedented levels. As organizations’ digital landscapes become increasingly complex—spanning the cloud, generative AI, and evolving threat tactics—security teams are struggling to keep pace. Many are feeling overwhelmed by the sheer volume and sophistication of cyber threats, and some are even leaving the profession altogether. The good news […]
Generative AI for data privacy: 3 AI data protection capabilities
Security leaders are well aware of the challenges posed by generative AI: concerns around data leaks, AI-driven cyberattacks, phishing schemes, and ethical implications often dominate SOC discussions. While these risks are significant, focusing solely on the threats presented by generative paints an incomplete picture. Generative AI is not just a dark force—it holds tremendous potential […]
Watch out: Business email compromise attacks get an upgrade with generative AI
In the past year, business email compromise (BEC) attacks have skyrocketed, with malicious actors harnessing the power of generative AI to craft increasingly sophisticated fraudulent emails. The challenge with these next-generation BEC attacks lies in their complexity; they are not only hard to prevent but also notoriously difficult to detect. However, there are effective strategies […]
Prompt sanitization: How to protect against AI data loss
Generative AI tools like ChatGPT are, without doubt, game-changers for businesses across sectors. But they also come with significant risks. Sensitive data shared with these AI models can quickly spiral out of control, leading to unintentional but costly data leaks. The result? Your business could be embroiled in a data breach before you even realize […]
What’s the difference between human risk management and security awareness training?
Security awareness training is often seen as the cornerstone of managing the human factor. The goal is simple: provide employees with enough information to recognize and avoid potential risks. These programs can take many forms, from posters that offer cyber hygiene reminders to more structured eLearning sessions designed to ensure every employee has completed necessary […]
Are malicious insiders lurking in your SaaS apps?
The recent Disney data breach highlights the ever-present risk malicious insiders present to organizations–especially in the cloud-based working world. Whether on Microsoft Teams, Slack, or Google Workspace, almost all employees now rely on SaaS apps to carry out their work. In the process, they’re sharing, uploading, and downloading plenty of workplace data. For the most […]
The role of data loss prevention in enterprise risk assessments
Data loss prevention (DLP) technology is often viewed solely through the lens of safeguarding sensitive information from unauthorized access or breaches. However, its role extends far beyond data protection—it plays a pivotal role in identifying and managing broader organizational risks. Here, we’ll look at the crucial role DLP should play in your enterprise risk assessments. […]