News

A misplaced mobile device can lead to a massive data breach. Consequently, it's important to have a well-defined mobile ...
Maintain regulatory compliance by conducting regular audits, adhering to standards like ISO 27001, SOC 2, and GDPR, and ...
A new top priority has emerged for today's chief marketing officers: safeguarding customer data. Protecting the privacy and ...
The University at Buffalo Data Technology Office (UBIT)’s Information Security Program identifies and describes goals, expectations, roles, and responsibilities with respect to information security ...
SAN FRANCISCO--(BUSINESS WIRE)--Global security leader Forcepoint today introduced Forcepoint ONE Data Security, an enterprise-grade unified cloud-managed solution designed to simplify data protection ...
It's that time of the year again-- time to renew the corporate cyber insurance policy, and as the most senior cyber security ...
Ensuring the security of data is of utmost importance, as highlighted by the Data Protection Act of 2019. This act emphasizes the need to prioritize data protection through design or default.
AUSTIN, Texas--(BUSINESS WIRE)--Forcepoint, a global leader in data-first cybersecurity solutions, unveils its comprehensive GenAI Security solution, offering visibility, control, and risk-based data ...
A look back at recent data breaches including the Hydraq attacks exposes an alarming trend that only a handful of security experts anticipated. As predicted by some as early as 2005, Internet ...
Our decades-old federal privacy laws have not kept pace with the many trends that have transformed our very online world.
The University of Nevada, Reno (University, UNR) recognizes the transformative potential of emerging generative Artificial Intelligence (AI) tools (ChatGPT, OpenAI, Microsoft Copilot, etc.) which have ...