encryption software
Latest about encryption software

Data spills and shadow data: How exposed are you to the risks?
By Andy Swift published
The larger an organization is, the more ‘shadow data’ it often has, and the harder it seems to be to keep track of all the different places data is stored.

Reducing downtime in no time: Data archiving and backup
By Steve Butterfield published
How businesses can get back on time quickly following a ransomware attack or similar disaster.

How CISOs can apply threat modelling to AI products in four steps
By Brandon Green published
Build resilience into AI products by integrating threat modelling into the software development cycle

Don’t blame Slack for training its AI on your sensitive data
By Rohan Sathe published
Anyone using technology today should assume their data will be used to train AI.

Four steps to build cyber resilience in the public sector
By Mark Jow published
Elections loom, and nation-state cyber threats intensify. Learn 4 essential steps public sector organizations can take to safeguard national security.

There are no insignificant breaches: Why all compromised data matters
By Dirk Schrader published
Is there such a thing as an insignificant breach? Dirk Schrader says no.

The power of open-source databases in battling financial fraud
By Danny Butvinik published
Utilizing open-source databases revolutionizes real-time detection and prevention of financial fraud

Why AI won’t replace human intelligence in cybersecurity
By Khurram Mir published
AI can help mitigate cybersecurity threats, but human input and oversight can't be replaced.
Sign up for breaking news, reviews, opinion, top tech deals, and more.