DataBreachToday.com
Rethinking Cybersecurity in a Platform World
3 months 4 weeks ago
How Consolidation Is Forcing CISOs and CIOs to Rethink Security Architecture
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
Webinar | From Continuous Controls Monitoring to Continuous Assurance: How a Security Data Fabric Unlocks the Next Era of Compliance
3 months 4 weeks ago
Webinar | From Continuous Controls Monitoring to Continuous Assurance: How a Security Data Fabric Unlocks the Next Era of Compliance
3 months 4 weeks ago
Webinar | Securing the Modern Software Supply Chain's Weakest Links
3 months 4 weeks ago
Treasury Cuts Ties With Booz Allen Over IRS Data Leaks
3 months 4 weeks ago
Booz Allen Loses Treasury Work in Move Tied to Trump Waste Crackdown
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
Claroty Gets $150M to Lead in AI for Infrastructure Security
3 months 4 weeks ago
Claroty CEO Yaniv Vardi Outlines IPO Strategy and Growth Through Acquisition
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Upwind Secures $250M to Extend CNAPP to AI, Data Security
3 months 4 weeks ago
Series B Round at $1.5B Valuation Backs Push Into AI, Application and Data Security
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Study: Future IT Workers Would Sell Patient Data
3 months 4 weeks ago
Nearly 60% of Tech Students Said They'd Violate HIPAA If the Price Was Right
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Identity Fraud: The New Crimewave Targeting Remote Work
3 months 4 weeks ago
The Urgency of High-Assurance Identity Proofing Amid Growing Identity Fraud
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Charting the Next Era of Digital Identity and Trust
3 months 4 weeks ago
Identity Proofing Becomes Essential as Remote Work Redefines Enterprise Trust
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Continuous Identity Assurance Is Now Security Infrastructure
3 months 4 weeks ago
From Remote Hiring to Access and Support, Trust Must Be Verified - Not Assumed
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Webinar | Hyper TPRM: Rethinking Third-Party Risk for Scale, Speed, and Confidence
3 months 4 weeks ago
Live Webinar | APIs for AI Agents: Building Predictable, Governed Systems at Enterprise Scale
4 months ago
Live Webinar | APIs for AI Agents: Building Predictable, Governed Systems at Enterprise Scale
4 months ago
ISMG Editors: How Deepfakes Are Breaking Digital Trust
4 months ago
Also: How Non-Human Identities Redefine Security; the Delinea-StrongDM Deal
In this week's panel, four editors discussed how deepfakes are reshaping digital Know Your Customer practices, what the rise of non-human identities means for CISOs and what Delinea's acquisition of StrongDM tells us about where the privileged access market is heading.
In this week's panel, four editors discussed how deepfakes are reshaping digital Know Your Customer practices, what the rise of non-human identities means for CISOs and what Delinea's acquisition of StrongDM tells us about where the privileged access market is heading.
Microsoft Confirms Court-Ordered BitLocker Key Releases
4 months ago
FBI Accessed Encrypted Windows Devices Via BitLocker Keys, Microsoft Says
Microsoft confirmed it handed over BitLocker recovery keys to the FBI in 2025 under court order, raising concerns over cloud-stored encryption keys and whether default designs that prioritize recovery convenience and efficiency weaken user control and security.
Microsoft confirmed it handed over BitLocker recovery keys to the FBI in 2025 under court order, raising concerns over cloud-stored encryption keys and whether default designs that prioritize recovery convenience and efficiency weaken user control and security.
ISMG, CyCube Join Forces to Better Train AI-Era Defenders
4 months ago
Partnership With Israeli Startup Brings Real-World Threat Labs to Security Training
ISMG has teamed with CyCube to strengthen CyberEd.io's hands-on cyber training platform. The strategic investment aims to deliver personalized, adaptive labs and assessments that help security teams respond to evolving threats fueled by generative and agentic AI.
ISMG has teamed with CyCube to strengthen CyberEd.io's hands-on cyber training platform. The strategic investment aims to deliver personalized, adaptive labs and assessments that help security teams respond to evolving threats fueled by generative and agentic AI.
Audio Accessory Flaw Converts Headphones Into Spy Tool
4 months ago
'WhisperPair' Flaw Likely to Endure for Years
A hacker could secretly record phone conversations, track users' locations and blast music through headphones due to a flaw in implementations of a Google-developed low-energy technology for discovering nearby Bluetooth devices.
A hacker could secretly record phone conversations, track users' locations and blast music through headphones due to a flaw in implementations of a Google-developed low-energy technology for discovering nearby Bluetooth devices.
US Officials Urge Congress to Reauthorize Key Quantum Law
4 months ago
Feds Warn US May Lose Quantum Race Without Sustained Research Funding
Federal scientists told Congress that failure to reauthorize the National Quantum Initiative threatens to unravel coordinated research and development progress, stall commercialization and allow China to surpass U.S. leadership as adversaries accelerate post-quantum capabilities.
Federal scientists told Congress that failure to reauthorize the National Quantum Initiative threatens to unravel coordinated research and development progress, stall commercialization and allow China to surpass U.S. leadership as adversaries accelerate post-quantum capabilities.
Checked
8 hours 15 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed