A digital transformation is taking place on the frontline. Employees who were once underserved by enterprise technology are now gaining access to modern SaaS tools that drive efficiency, collaboration, and real-time decision-making. For organizations, it’s a powerful opportunity to unlock greater productivity at scale. But it also introduces new risks. Each new endpoint expands the […]
Data security news & resources

Allianz Life data breach impacts 1.4 million customers
Allianz Life has announced it suffered a data breach that impacted the personal data of the majority of its 1.4 million customers. The company, a major provider of life insurance and annuities, is part of Allianz SE—one of the world’s largest financial services groups, serving more than 128 million people globally. Here’s everything we know […]

AI grounding: How to achieve it
You’ve rolled out a generative AI tool to help teams move faster and work smarter. But there’s a problem: the answers are off…Sometimes outdated…Sometimes just plain wrong. That’s what happens when AI isn’t grounded—when it doesn’t have access to the right internal data. Instead of insights, you get hallucinations. And it’s a major issue. In […]

Do you need cyber insurance in 2025?
We’re only halfway through 2025, and there have already been over 12,000 publicly disclosed data breaches. From small brick-and-mortar businesses to multinational tech companies, it’s clear that no organization is immune to a cybersecurity incident. Preparation is key—and one increasingly vital part of shoring up against cyber-attacks is cyber insurance. In this article, we’ll explore […]

Secure AI usage: Why policies aren’t enough
Every organization understands that AI is central to competing and thriving in the future of work. But with that opportunity comes risk. For every gain in speed, efficiency, and output, AI introduces new vulnerabilities: data leakage, regulatory exposure, ethical concerns, and the potential misuse of sensitive information. Governing this technology is critical to long-term success. […]

Human risk management: The key to a culture of cybersecurity
All employees make mistakes—whether that’s a typo in an email, sending a document to the wrong person or missing a deadline. Some mistakes, though, have greater consequences than others, especially when it comes to cybersecurity and compliance. Sending a sensitive document to the wrong recipient, for example, can be an immediate data breach and compliance […]

Runtime data security vs DSPM
In the alphabet soup of cloud security tools, few acronyms have risen faster—or with more promise—than data security posture management (DSPM). Touted as a cure-all for sensitive data exposure, DSPM promises deep visibility into cloud environments. But as many CISOs have found, visibility alone isn’t enough. DSPM might show you where the problems are—but it […]

Is your customer service team a data leak waiting to happen?
On May 15, the crypto giant, Coinbase, announced that malicious actors had gotten away with the personal information of tens of thousands of customers—an incident set to cost the company nearly $400 million. But the scale of this breach isn’t the major story. It’s how the cybercriminals did it—bribing outsourced customer service agents to steal […]

Security training is failing. Here’s what really works.
Companies are pouring more money than ever into training their people to spot and stop cyber threats. But despite the investment, one stubborn issue won’t go away: humans are still behind the vast majority of data breaches. Even with security awareness training becoming the norm, the numbers show they’re having little impact—60% of breaches still […]

AI readiness: A guide for healthcare organizations
With over 4 billion people currently lacking access to healthcare services and a projected shortage of 11 million health workers by 2030, AI might well be a savior for healthcare organizations in the next several years. From revolutionizing drug delivery to enhancing diagnostic accuracy, AI could significantly enhance both the quality of care and the […]

How to build a human firewall in the cloud
As more organizations embrace cloud applications like Google Workspace and Microsoft 365, the security risks are escalating. In fact, 4 out of 5 companies have fallen victim to a cloud security breach in the last 18 months. While it’s easy to blame the cloud itself, the reality is more complex: these breaches are not typically […]