Editorial Staff



When policy is not coupled with a well-planned compliance and evaluation program, the agency will likely fail to broadly adopt improved data management practices. Furthermore, if a compliance plan is absent, the agency will be at risk. Failing to ensure compliance with new requirements can call attention to gaps and […]

Good data management policy is a critical foundation for any ...




Cigent Technology, Inc. has launched the Cigent Endpoint Data Protection Platform, an expert-derived solution designed to protect data from ransomware, data exfiltration, and data loss. Developed by exfiltration experts trained in the most demanding environments, the platform provides a comprehensive suite of endpoint data protection services, setting a new standard […]

Enhanced Security and Productivity with Cigent Endpoint Data Protection


Most cybersecurity teams are under immense pressure to contain threats and recover from attacks as swiftly as possible. Fortunately, if they leverage classification methods, they can relieve some of that strain. How can data classification improve their incident response? What Is Data Classification? Data classification is the practice of organizing […]

How Data Classification Improves Incident Response


The latest addition to the Lineaje product portfolio empowers organizations to secure the entire software supply chain, from open-source to proprietary components Lineaje, a leader in continuous software supply chain security management, today unveiled Open-Source Manager (OSM). The comprehensive, first-of-its-kind solution brings transparency to open-source software components in applications and […]

Lineaje Unveils First-of-its-Kind Open-Source Manager to Advance Continuous Software Supply ...



In an era where cyber threats are becoming more sophisticated and widespread, Token has taken a significant step forward by introducing the new Token Ring, equipped with BioTouch Secure™ technology. This innovative product aims to transform the landscape of multi-factor authentication (MFA) by offering a more secure, user-friendly solution that […]

Token Unveils Cutting-Edge MFA Ring to Combat Cyber Threats






Gemini is Google’s newest family of Large Language Models (LLMs). The Gemini suite currently houses three different model sizes: Nano, Pro, and Ultra. Although Gemini has been removed from service due to politically biased content, new findings from HiddenLayer – unrelated to that issue – analyze how an attacker can […]

Unveiling Gemini: Google’s LLM Vulnerabilities Exposed by HiddenLayer


Geospatial data is an overlooked tool that can significantly improve cybersecurity efforts. How can location-specific information stop cyber attacks and deter cybercriminals? What Is Geospatial Data? Geospatial data is location-related information about individuals, objects or events. The most common examples are demographic details, addresses, transportation networks and satellite imagery. Although […]

How Geospatial Data Improves Cybersecurity