#data security

[ follow ]
fromTheregister
6 hours ago

Microsoft Edge to auto-launch Copilot on every Outlook link

This experience helps users quickly understand content, take action with fewer steps, and get more value from Copilot while extending productive browsing time in Edge.
Miscellaneous
Information security
fromThe Hacker News
7 hours ago

Expert Recommends: Prepare for PQC Right Now

Adversaries are stealing encrypted data now to decrypt later using quantum computers, requiring organizations to migrate to post-quantum cryptography immediately to protect long-term sensitive data.
#age-verification
fromGameSpot
1 day ago
Privacy technologies

Over 90% Of Discord Users Will Not Need To Verify Their Age, CTO Says

Discord delays global age verification to late 2026, clarifying that 90% of users won't need authentication unless accessing age-restricted content and cannot be verified as adults.
fromElectronic Frontier Foundation
1 month ago
Privacy technologies

So, You've Hit an Age Gate. What Now?

Age verification mandates force data collection that risks privacy and speech; submit the minimum data possible and prefer privacy-preserving methods when available.
fromGameSpot
1 day ago
Privacy technologies

Over 90% Of Discord Users Will Not Need To Verify Their Age, CTO Says

Privacy technologies
fromTheregister
20 hours ago

AI takes a swing at online anonymity

Large language models can efficiently deanonymize internet users across multiple platforms by automating the process of connecting anonymous posts to identify individuals with high precision.
Privacy technologies
fromFast Company
1 day ago

Discord delays global age verification rollout after user backlash

Discord postponed its age verification policy to late 2026 after user backlash over privacy concerns, acknowledging the company missed the mark on implementation.
Artificial intelligence
fromTechzine Global
1 day ago

Veeam launches Agent Commander for AI risk management

Veeam's Agent Commander detects AI risks, protects AI systems, and enables rapid error recovery through real-time data and agent monitoring using a Data Command Graph intelligence engine.
Tech industry
fromEntrepreneur
5 days ago

Store 1TB of Company Files for Just $60

OnlineDrive provides 1TB lifetime cloud storage with enterprise-grade security, resumable uploads, regional servers, team workspaces, and S3 infrastructure for $59.99.
fromBusiness Matters
1 week ago

What Happens to Business Technology When It Reaches End of Life?

Most businesses, which includes modern ones, invest heavily in technology, but they rarely plan for its eventual and inevitable exit strategy. Generally speaking, companies spend millions on the latest hardware while overlooking the critical phase when those assets reach their end. This lack of planning creates a massive gap in the operational lifecycle of many otherwise successful global organizations. Decisions made at the end of a device's life carry real business risks that can impact the bottom line financially and environmentally speaking.
Information security
Artificial intelligence
fromThe Daily Star
1 week ago

AI chatbots emerge as new frontier for advertisers

Introducing advertisements and sponsored content in chatbots raises privacy and trust concerns as AI firms seek new revenue while promising not to sell user data.
UK news
fromTheregister
2 weeks ago

UK blames legacy IT for incomplete data protection progress

Legacy IT systems and reliance on email hinder government technical measures to prevent accidental exposure of highly sensitive data, risking lives and hindering reforms.
Law
fromAbove the Law
2 weeks ago

I've Taken Steps To Protect My Client's Documents: But What Happens Post-Production? - Above the Law

Using GenAI during and after document production can cause irreversible public disclosure of trade secrets once opposing parties or their tools expose them.
#ai-security
fromNature
3 weeks ago

'It means I can sleep at night': how sensors are helping to solve scientists' problems

In fact, Stawicki was on a mission to save the lives of around 1,000 zebrafish ( Danio rerio) in her laboratory. Similarities between lines of hair cells on the fish's flanks and those in the mammalian inner ear enable her to use them as a model to study hearing problems in humans caused by some antibiotics and chemotherapy drugs. A sensor had picked up that the lab's heating system had been knocked out by a power fault.
Science
US politics
fromTheregister
3 weeks ago

StopICE alerts hacked to sen texts , admins accuse CPB agent

StopICE blamed a CBP agent for attacking its app and sending false text alerts, but StopICE says no user personal data was stored or leaked.
fromMedium
1 month ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Firewalls can fail, passwords can be stolen, but strong encryption remains your last line of defense. InToday's digital world, protect sensitive personal details is more critical and important than ever. The AES algorithm (Advanced Encryption Standard) algorithm is one of the most trusted and widely used way or method for securing data against unauthorized access and frauded. Advanced Encryption Standard supports different levels like 128-bit, 192-bit, and 256-bit encryption, providing strong security for personal data and more.
Information security
Privacy professionals
from24/7 Wall St.
3 weeks ago

AARP Calls for Accountability Over Trump Administration Social Security Blunder

Social Security numbers are widely used across institutions, are highly sensitive, and recent government mishandling risks exposing Americans' private data.
US politics
fromTheregister
3 weeks ago

CISA insider-threat warning comes with an ironic twist

Insider threats are among the most serious security risks and require multidisciplinary teams and decisive action to detect, mitigate, and prevent damage.
Artificial intelligence
fromTechzine Global
4 weeks ago

Director of cybersecurity service uploaded sensitive documents to ChatGPT

A CISA acting director uploaded official-use-only CISA contract documents into public ChatGPT, triggering security alerts and a DHS investigation.
#data-security
fromAlleywatch
1 month ago
Information security

Teleskope Raises $25M to Address Enterprise Data Security with Agentic Automation

fromTechCrunch
1 month ago
Startup companies

Data security startup Cyera hits $9B valuation six months after being valued at $6B | TechCrunch

fromAlleywatch
1 month ago
Information security

Teleskope Raises $25M to Address Enterprise Data Security with Agentic Automation

fromTechCrunch
1 month ago
Startup companies

Data security startup Cyera hits $9B valuation six months after being valued at $6B | TechCrunch

Privacy professionals
fromeLearning Industry
4 weeks ago

Why Data Privacy Is Mission-Critical In Corporate eLearning

Establish and enforce robust data privacy standards for corporate eLearning to protect sensitive learner information and reduce legal, financial, and reputational risks.
France news
fromEngadget
4 weeks ago

The French government is ditching Zoom and Microsoft Teams for a home-grown alternative

France will replace Microsoft Teams and Zoom with domestic videoconference platform Visio across all civil service departments to strengthen digital sovereignty and cut costs.
#tiktok
US politics
fromFortune
1 month ago

Trump's latest retribution hits Booz Allen, whose contractor was charged with leaking tax returns to the press | Fortune

Treasury cut Booz Allen contracts after a contractor leaked confidential IRS tax records of thousands of wealthy people, including President Donald Trump.
fromNextgov.com
1 month ago

Treasury cancels all Booz Allen contracts

The Treasury Department has moved to cancel all contracts with Booz Allen Hamilton, two years after a former company employee pled guilty to leaking President Trump's confidential tax information without authorization. Treasury currently has 31 contracts with Booz Allen that average roughly $4.8 million in annual spending and have totaled $21 million in obligations. In a statement issued Monday, Treasury Secretary Scott Bessent cited inadequate data protection safeguards as driving the decision and specifically the disclosure of sensitive taxpayer information accessed through IRS contracts.
Brooklyn
fromBrooklyn Eagle
1 month ago

Chi Osse, Councilmembers rally with CAMBA IT workers over outsourcing threat

Councilmember Chi Ossé and 18 Council members condemned CAMBA's plan to outsource its IT department amid an ongoing CAMBA IT workers strike and labor-law allegations.
Information security
fromMedium
1 month ago

Think Your Data Is Secure? Not Without AES Encryption In Java

Strong encryption, especially AES-256-GCM, provides robust, reliable protection for sensitive personal data against unauthorized access and modern cyber threats.
fromBusiness Insider
1 month ago

Read the memo TikTok's CEO sent staff after closing a deal to avoid a US ban

The TikTok divestment deal is done, and the company's CEO is jubilant. On Thursday, TikTok's top boss, Shou Chew, sent a message to US staffers, toasting the "great news" and thanking them for their "resilience." He also announced that "more than 200 million Americans now come to TikTok to be entertained, learn, and grow their business with a broader global community." Chew has good reason to take a victory lap.
Tech industry
US politics
fromFast Company
1 month ago

TikTok seals deal forming new joint American venture with major investors

TikTok formed a U.S. joint venture with Oracle, Silver Lake and MGX implementing security safeguards to avoid a potential nationwide ban.
EU data protection
fromTechzine Global
1 month ago

Regulator investigates Kyndryl's acquisition of Dutch Solvinity

BTI is investigating Kyndryl's proposed acquisition of Solvinity to assess potential risks to DigiD's accessibility and data security under national-security rules.
Information security
fromMedium
1 month ago

Think Your Data Is Secure? Not Without AES Encryption In Java

AES-256-GCM strong encryption provides robust, reliable protection for sensitive personal data as a last line of defense against modern cyber threats.
Marketing tech
fromExchangewire
1 month ago

Assertive Yield Achieves SOC 2 Certification, Reinforcing Commitment to Data Security & Operational Excellence

Assertive Yield achieved SOC 2 Type II certification, confirming enterprise-level data security, operational maturity, and strengthened trust across its ad tech partners.
Artificial intelligence
fromTechCrunch
1 month ago

The AI healthcare gold rush is here | TechCrunch

AI companies are rapidly investing in healthcare and voice AI, launching products and raising large funding while facing hallucination, misinformation, and data security risks.
fromwww.independent.co.uk
1 month ago

How your entire identity could be sold for 30 on the dark web

British identity packages, including an ID scan, a selfie, and a dossier of personal data, can be purchased by criminals on the dark web for as little as 30, new research suggests. As identity theft continues to rise, experts have discovered the sale of national identity documents, driving licences, credit card details and 2,000 UK frequent traveller passports. The information can be exploited in multiple ways and used to apply for credit cards, mortgages, car loans, or to open bank accounts.
UK news
Artificial intelligence
fromTheregister
1 month ago

Anthropic floats Claude Cowork for office work automation

Claude Cowork automates office tasks by interacting with local files and apps, enabling data movement and document generation while requiring cautious use for security.
fromwww.bbc.com
1 month ago

MPs step up calls to block Chinese mega-embassy

The government has insisted no decision has been made on a Chinese mega-embassy in London, after MPs on all sides warned of a potential threat to national security. The Conservatives claimed the controversial scheme would give China a "launch-pad for economic warfare". Labour, Tory, Liberal Democrat, DUP and SNP MPs all urged the government to reject the embassy plans to prevent espionage and guard against the "transnational repression" of Hong Kongers in the UK, in an urgent Commons debate.
UK politics
Artificial intelligence
fromComputerworld
1 month ago

Anthropic releases Cowork - Claude Code directly on your computer

Cowork lets Claude access and edit a selected computer folder to manage files, compile data, and write reports, while raising security and injection risks.
US politics
fromwww.mercurynews.com
1 month ago

Opinion: The DOJ suing for voter data is dangerous on many levels

DOJ's nationwide demand for detailed voter records exceeds legal authority and risks exposing sensitive personal data while undermining state responsibility for voter rolls.
fromEngadget
1 month ago

Anthropic made a version of its coding AI for regular people

If you follow Anthropic, you're probably familiar with Claude Code. Since the fall of 2024, the company has been training its AI models to use and navigate computers like a human would, and the coding agent has been the most practical expression of that work, giving developers a way to automate rote programming tasks. Starting today, Anthropic is giving regular people a way to take advantage of those capabilities, with the release of a new preview feature called Claude Cowork.
Artificial intelligence
fromTheregister
1 month ago

How hackers fight back against ICE surveillance tech

The Electronic Frontier Foundation (EFF) has rounded up several of these counter surveillance projects, and perhaps unsurprisingly many of these have to do with Flock, best known for its automated license plate reader (ALPR). Flock operates the largest network of surveillance cameras in America, and, while it has contracts with thousands of police departments and municipalities across the US, sometimes ICE gains access to this footage, according to US Senator Ron Wyden (D-OR) and those who have looked into Flock's misuse.
Privacy technologies
fromFortune
1 month ago

Exclusive: Cyera CEO Yotam Segev on raising $400 million and why the stakes in cybersecurity are getting higher | Fortune

The wings are lifting the valuation of Segev's startup too. In June, Cyera was valued at $6 billion in its seventh funding round. Now, just six months later, Cyera is worth $9 billion. Cyera raised $400 million in its recently closed Series F funding, the company exclusively confirmed to Fortune. Blackstone Growth led the round, with participation from existing investors including Accel, Coatue, Cyberstarts, Georgian, Greenoaks, Lightspeed Venture Partners, Redpoint, Sapphire Ventures, Sequoia Capital, and Spark.
Information security
Environment
fromEarth911
1 month ago

How to Recycle Your Old Computer

Recycling laptops saves significant energy, recovers valuable metals, reduces environmental harm, and helps curb rapidly growing global electronic waste.
Information security
fromNextgov.com
2 months ago

When data defense becomes national defense

Securing data systems is essential to national security because AI-enabled infrastructure depends on trustworthy data and resilient data pipelines.
fromwww.theguardian.com
2 months ago

MPs question UK Palantir contracts after investigation reveals security concerns

Palantir is a US company that provides software to integrate and analyse data scattered across different systems, such as in the health service. It also provides artificial intelligence-enabled military targeting systems. The investigation cites an expert report, internal to the Swiss army, that assessed Palantir's status as a US company meant there was a possibility sensitive data shared with it could be accessed by the US government and intelligence services.
UK politics
#tiktok-sale
Privacy professionals
fromeLearning Industry
2 months ago

In A World Of Breaches, Can EdTech Rebuild Trust In Digital Learning?

Privacy and assurance, not just access and efficiency, must underpin digital learning platforms to rebuild trust, protect data, and prioritize learner rights.
Marketing tech
fromMarTech
2 months ago

Salesforce brings Agentforce Sales to ChatGPT | MarTech

Salesforce's Agentforce Sales app embeds ChatGPT into Salesforce CRM, enabling sellers to query data and automate actions in conversational workflows while preserving data governance.
fromFast Company
2 months ago

DOGE leader at Treasury is looking to buy thousands of ChatGPT licenses

Sam Corcos, a former startup leader and Department of Government Efficiency affiliate now serving as chief information officer at the Treasury Department, appears to have approved spending at least $1.5 million on up to 3,000 licenses for ChatGPT, the OpenAI platform, federal spending records show. The agency has obligations to spend $1.5 million on the services, and has already outlaid more than $500,000 for the technology, those records show.
US politics
Artificial intelligence
fromAbove the Law
2 months ago

LexisNexis Protege Announces Glow-Up As It Hopes To Be One-Stop Legal AI Shop - Above the Law

LexisNexis expanded Protégé General AI to unify internal content, customer documents, and web insights while adding automated model selection and secure legal workflows.
fromComputerworld
2 months ago

Keep AI browsers out of your enterprise, warns Gartner

AI browsers including Perplexity Comet and OpenAI's ChatGPT Atlas present security risks that cannot be adequately mitigated, and enterprises should prevent employees using them, according to Gartner. "Gartner strongly recommends that organizations block all AI browsers for the foreseeable future because of the cybersecurity risks," analysts Dennis Xu, Evgeny Mirolyubov, and John Watts wrote in a research note last week. They made their recommendation based on risks they had already identified, "and other potential risks that are yet to be discovered, given this is a very nascent technology."
Information security
Privacy technologies
fromwww.theguardian.com
2 months ago

Labour wants to ramp up facial recognition. What if our data ends up in the wrong hands? | Simon Jenkins

Nationwide facial recognition and centralized data systems threaten privacy because digital records inevitably leak and can be misused.
#shadow-ai
fromIT Pro
3 months ago
Artificial intelligence

Gartner says 40% of enterprises will experience 'shadow AI' breaches by 2030 - educating staff is the key to avoiding disaster

fromIT Pro
3 months ago
Artificial intelligence

Gartner says 40% of enterprises will experience 'shadow AI' breaches by 2030 - educating staff is the key to avoiding disaster

fromTechzine Global
2 months ago

Snowflake and Anthropic deepen collaboration with $200 million deal

Claude will also form the core of Snowflake Intelligence, the data platform's enterprise intelligence agent. The two companies have collaborated before, with thousands of Snowflake customers processing trillions of Claude tokens monthly through Snowflake Cortex AI. The previous integration brought Claude to Snowflake's AI Data Cloud, but this new phase goes further. The focus is now on implementing advanced AI agents capable of multi-step analysis.
Business intelligence
Privacy technologies
fromFortune
2 months ago

Arizona becomes latest state to sue Temu over claims that its stealing customer data | Fortune

Arizona sued Temu and PDD Holdings alleging deceptive practices, massive unauthorized data collection, intellectual property copying, and risks from Chinese data-access laws.
Privacy professionals
fromFast Company
2 months ago

Temu sued in Arizona over alleged data theft and misleading consumers

Temu is accused of collecting extensive sensitive user data, misleading consumers about product quality, infringing brands' intellectual property, and posing national data-security concerns.
Privacy professionals
fromInfoWorld
3 months ago

OpenAI admits data breach after analytics partner hit by phishing attack

Impacted organizations, admins, and users are being notified; exposure limited to Mixpanel data with no evidence of OpenAI system breach or compromise of sensitive credentials.
UK news
fromTechCrunch
3 months ago

Multiple London councils report disruption amid ongoing cyberattack | TechCrunch

Three London councils shut down networks and phone lines and activated emergency plans in response to an ongoing cyberattack while investigations continue.
UK news
fromwww.bbc.com
3 months ago

Multiple London councils 'hit by cyber-attacks'

Multiple London councils faced cyber-attacks within 24–48 hours, causing IT outages, disrupted services, network shutdowns, and heightened security responses to protect resident data.
US politics
fromTechCrunch
3 months ago

DOGE days are over as Trump disbands Elon Musk's team of federal cost-cutters | TechCrunch

The Trump administration disbanded the Musk-led Department of Government Efficiency (DOGE) early, ending controversial federal cost-cutting with alleged harms, data risks, and disputed savings.
Miscellaneous
fromTheregister
3 months ago

NATO taps Google for air-gapped sovereign cloud

Google Cloud will provide NATO's NCIA with air-gapped sovereign cloud services and AI to secure JATEC operations and ensure data residency and operational autonomy.
Privacy technologies
fromTheregister
3 months ago

Google touts Private AI Compute for cloud confidentiality

Google's Private AI Compute creates an isolated datacenter environment to process sensitive personal data, extending Android's on-device privacy guarantees to cloud AI.
Information security
fromNextgov.com
3 months ago

Building quantum-safe foundations for federal data resilience

Agencies must inventory and secure data now because quantum computers will eventually break current encryption, creating "harvest now, decrypt later" risks.
fromTechzine Global
3 months ago

Commvault launches Cloud Unity for cyber resilience

The new version combines data security, cyber recovery, and identity security in a single environment. It is designed to help organizations tackle the ever-present threat of data explosion and identity-driven attacks. According to Commvault, Cloud Unity arose from the need to tackle multiple challenges simultaneously: the growth of data due to AI, the increasing complexity of attacks on identity systems, and the management of all kinds of separate tools.
Information security
Gadgets
fromSocial Media Explorer
3 months ago

Expert Guide: Setting Up a Quiet and Secure NAS - Social Media Explorer

Home NAS provides centralized, accessible, and reliable personal storage while requiring energy-efficient hardware and strong security to protect data and ensure long-term cost-effectiveness.
US politics
fromWIRED
3 months ago

Social Security Employees Grill Management During Tense Shutdown Meeting

SSA morale fell during the shutdown, causing long beneficiary waits, staff shortages, and allegations that DOGE operatives mishandled sensitive Social Security data.
Venture
fromAlleywatch
3 months ago

The AlleyWatch Startup Daily Funding Report: 11/5/2025

Multiple NYC startups closed funding on 11/5/2025, including Teleskope ($25M Series A), AUI ($20M venture), Synonym ($18.4M), Parable ($16.5M), and iVerify ($12.3M).
fromwww.theguardian.com
3 months ago

Amazon sues AI startup over browser's automated shopping and buying feature

Amazon sued a prominent artificial intelligence startup on Tuesday over a shopping feature in the company's browser, which can automate placing orders for users. Amazon accused Perplexity AI of covertly accessing customer accounts and disguising AI activity as human browsing. Perplexity's misconduct must end, Amazon's lawyers wrote. Perplexity is not allowed to go where it has been expressly told it cannot; that Perplexity's trespass involves code rather than a lockpick makes it no less unlawful.
Artificial intelligence
fromwww.bbc.com
3 months ago

Security concerns over system at heart of digital ID

It will be based on two government-built systems - Gov.uk One Login and Gov.uk Wallet. One Login is a single account for accessing public services online, which the government says more than 12 million people have already signed up to. By this time next year that might be as many as 20 million, as people registering as company directors will have to verify their identity through One Login from 18 November.
UK politics
fromApp Developer Magazine
1 year ago

Perforce reveals uncertainty around AI data privacy

The report shows that 91% of organizations believe sensitive data should be allowed in AI model training. At the same time, 78% report high concern about theft or breaches. Experts say this discrepancy stems from a lack of understanding about the permanence of data in AI systems. Once sensitive information is used to train a model, it cannot be fully removed or made completely secure. This creates a lasting exposure risk, particularly when personal or confidential data is involved.
Artificial intelligence
fromemptywheel
3 months ago

Follow the Money: Chuck Grassley Doxes the Entire Far Right - emptywheel

The release is definitely serving his purposes. One after another far right wing propagandist is screaming, Worse than Watergate!!! But the may also be an absolute gold mine for people trying to reconstruct what Trump did in 2020, to say nothing of political oppo researchers and foreign hackers. The subpoenas provide a map of all the political organizations that were close to Trump in 2020 to 2021, organized by person; not all of these are public and certainly not in such a readily usable form.
US politics
Miscellaneous
fromIT Pro
3 months ago

Cohesity appoints new channel development lead for UK, Ireland, and Benelux

Cohesity appointed Harvey Smith to lead channel development across the UK, Ireland, and Benelux to expand partner capabilities and drive regional growth.
Venture
fromAlleywatch
4 months ago

The Weekly Notable Startup Funding Report: 10/20/25

Eighteen notable US startups raised $1.4B the week ending 10/18/25, highlighted by rounds for Aptera, Basis Theory, Campfire, and ClaimSorted.
UK politics
fromTheregister
4 months ago

UK rethinks offshoring ban for 8M online procurement system

The UK plans to allow offshore subcontracting for maintenance of the Central Digital Platform, despite original contract requirements restricting work and data handling to the UK.
Artificial intelligence
fromClickUp
4 months ago

Top 11 AI Voice Assistants for 2025 | ClickUp

AI voice assistants convert spoken commands into actions that save time, integrate with existing tools, and must prioritize accuracy, security, and ease of use.
[ Load more ]