DLP
![illustration of robot holding a shield with text AI](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
How GenAI risks continue to impact security posture
Generative AI (GenAI) tools are transforming the way people work. They assist organizations in creating personalized content quickly. They also help streamline supply chains, automate decision-making, and facilitate agile business processes. In ...
![Veeam data Rezilion Spring4Shell Log4j vulnerabilities time Kaseya ransomware recovery REvil](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Survey Surfaces Willingness to Switch Data Protection Platforms
A Veeam survey found 54% of respondents planned to change their primary backup solution compared to 27% who wouldn't switch ...
![data, breaches, data breaches, NetApp data broker FTC location data](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security
DLP plays an important role, but it's not the only necessary component in a robust data protection strategy ...
![RansomHub ransomware](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
What the Future Holds for Data Security
With the proliferation of data in all aspects of life, from personal information to business operations, its protection becomes more critical than ever ...
Gartner® Market Guide for DLP | Why Context is King
With insider risk rising and becoming increasingly expensive, it’s becoming more incumbent on companies to figure out how they want to tackle it. Historically, one approach has been to use Data Loss ...
![ransomware, breach, Apple research study, data breaches, immutable storage, backup storage, ransomware data backup](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Securing Your Cloud Database: A Practical Guide
In the age of digital transformation, more and more businesses are shifting their operations to the cloud, leading to an increasing reliance on cloud databases. While these offer significant advantages such as ...
![illustration of android person with laptop computer](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Is AI revolutionizing cybersecurity? The answer isn’t as clear.
Peruse last quarter’s press releases from top cybersecurity vendors, and it’s hard to miss the focus on artificial intelligence (AI) and machine learning (ML). According to these vendors, traditional security tools are ...
![Illustration of robot stealing files from computer](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
The opportunities and risks of ChatGPT in cybersecurity
A lot of ink has been spilled over the past several months about the impact generative artificial intelligence (AI) platforms and chatbots like ChatGPT will have on cybersecurity. Many people, rightly so, ...
Proactive Insider Risk Management | A Case for Technology Consolidation
It is often said that any insider risk program must have a technology component to be effective in today’s enterprise environment, and few would get an argument. The technology stack is a ...
7 Reasons to Ditch Endpoint DLP for Endpoint Visibility
Companies really don't have any business collecting or managing. The post 7 Reasons to Ditch Endpoint DLP for Endpoint Visibility appeared first on DTEX Systems Inc ...