US cannabis brand, Stiiizy, is in the spotlight this week for all the wrong reasons, after it submitted a data breach notification to California’s attorney general. The contents of the filing detail a shocking data breach: an organized cybercrime group stole troves of sensitive data from the company in November 2024, getting away with confidential […]
Data security news & resources
Why data breach costs will reach new heights in 2025
In 2024, the average cost of a data breach soared to $4.88 million—a 10% increase over the previous year. This year, analysis indicates we will see the same percentage increase again, teetering over the $5 million mark. Obviously, this is an insane amount of money—an amount that would put many organizations out of business. So, […]
Need to know: data security posture management (DSPM)
Between misconfigured permissions, account hijacking, and the bring your own AI phenomenon, it’s easy to see why almost half of organizations suffered a cloud data breach in 2024. Until recently, protecting data in the cloud felt like trying to hit a moving target. With so many cloud applications, dispersed users, and data ever proliferating, maintaining […]
Securing the cloud: DPSM use cases
DSPM may be the latest buzzword in cybersecurity, but what does it actually do? How does it protect your data in the cloud? In this post, we’ll break down the key use cases of data security posture management (DSPM) to help you understand how this emerging technology works. Defining data security posture management (DSPM) Data […]
The crypto startup’s guide to data security
“Fail forward” might be the mantra amongst crypto startups, but when it comes to data security, mistakes can come with a devastating price tag. Over the past year, the average cost of a data breach surged to $4.8 million per incident, highlighting just how high the stakes are. Sure, making mistakes is part of the […]
Is data loss prevention (DLP) relevant in 2025?
Data loss prevention (DLP) solutions were once heralded as the cornerstone of a robust security program—a surefire way to protect sensitive information from falling into the wrong hands. But, today, they often cause more frustration than they do good. Steep learning curves, sky-high costs and a barrage of alerts mean that DLP is often more […]
The complete guide to Dropbox and HIPAA compliance
With its user-friendly interface, seamless file sharing capabilities, and collaboration features, it’s no wonder Dropbox is one of the most popular cloud storage solutions on the market. Millions of businesses and individuals rely on this platform to store and access their files securely across different devices. Chief amongst these organizations are healthcare companies—medical providers, practices, […]
Generative AI security: preparing for 2025
Artificial intelligence is set to be the defining technology of 2025. As AI tools become an integral part of everyday life, both at work and at home, the pressure is mounting for organizations to innovate and adapt—while securing their systems and data. Despite this growing urgency, many companies are still grappling with how to implement […]
AI governance: the key to a competitive advantage
Curious about AI governance, but not sure whether it matters or even how to begin? This guide is for you. Read on to discover what AI governance is, why it’s important, and how to get started. AI governance: What it is and why you need it As Gartner recently pointed out, AI is no longer […]
SaaS security best practices: the ultimate guide
In this guide, we’ll explore the best practices for securing SaaS applications, from understanding key threats and the vendor landscape to building a culture of data protection. By delving into the nuances of SaaS security, you’ll be better equipped to navigate the complex landscape of cloud-based threats and maintain robust defenses against potential vulnerabilities. What […]
Machine learning: the secret to effective data loss prevention
Data loss prevention (DLP) has a noise problem. Despite security teams carefully programming their solutions to catch sensitive data, most DLP tools alert them to benign instances—and lots of them. The reason? Regular expressions. Once the cornerstone of DLP, regular expressions have become outdated for the modern, cloud-based world. They cause inconsistent, inconsequential, inordinate amount […]