Student loan company Nelnet agreed to a $10 million settlement over a data security incident that impacted customers' information in 2022.
A Microsoft 365 Copilot bug allowed the AI assistant to read confidential emails despite Data Loss Prevention policies designed to protect sensitive information.
The article explains how AI is transforming cyber incident investigations, shifting focus from just data security to "Decision Security"—ensuring AI-driven conclusions are accurate, justifiable, and ...
Artificial intelligence (AI), particularly generative AI, thrives on vast amounts of data, fueling AI capabilities, insights, and predictions. But with this reliance on data comes potential privacy ...
Artificial intelligence raises the stakes in the ongoing responsibility to monitor data access and review third-party vendors. A retirement plan’s participant data are of immense value, and access to ...
Tokenization is emerging as a cornerstone of modern data security, helping businesses separate the value of their data from its risk. During this VB in Conversation, Ravi Raghu, president, Capital One ...
One of the most overlooked vulnerabilities in the modern threat surface is the network layer. Every time you connect to the ...
As AI continues to transform industries, the conversation around AI regulation has intensified. However, one crucial aspect often overlooked in these discussions is the foundational role of data ...
For more than 20 years, I’ve watched the relationship between people, devices and work evolve. The past few years have accelerated that evolution beyond what any of us imagined. The pandemic ...
LexisNexis confirmed a breach involving legacy servers and limited customer data. The company says there’s no impact to products or services.
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...
Personal data has become a highly sought-after commodity, exploited by individuals, companies, and state-sponsored actors, according to security experts. The pervasive collection of data through ...