News
Data Automation: Through integration with Dropbox and Box, ChatGPT can automate routine tasks such as file organization, tagging, and metadata management, liberating human resources for more ...
Eight years since its launch, Login.gov has narrowed the capabilities gap with many of its commercial counterparts, according to the Government Accountability Office, but there’s one outstanding data ...
The expanded Menlo Security solution will deliver zero-trust access to allow users to securely access their applications while preventing data leakage and securing file movement.
Concentric AI today announced the acquisition of Swift Security and Acante. With these acquisitions, Concentric AI now unifies data security posture management (DSPM), data loss prevention (DLP ...
Invest in AI-driven security and governance — AI is both a challenge and a solution. Businesses must leverage AI to automate classification, detection and protection of sensitive data at scale.
The Data Security Challenge In AI Development AI systems are only as good as the data they're trained on, but they're only as secure as the data they protect. When an organization develops an AI ...
SUNNYVALE, Calif.--(BUSINESS WIRE)--Proofpoint, Inc., a leading cybersecurity and compliance company, today announced the launch of the industry’s first unified data security solution designed ...
Aatish M is the founder & CEO of Strac, a leader in Data Discovery, DSPM, & DLP. Previously, he led payment security at Amazon for 11 years. Data security has become an ever-evolving challenge ...
Companies can’t maximize the value of their data without strong data security. Data breaches are becoming more common each year, and every company is looking to deploy AI—making it even more ...
As part of CRN’s Security 100 2025, we’ve assembled the following list by collecting many of the top vendors in the related — but not identical — segments of identity and access security ...
The health care industry faces a critical security challenge. While organizations invest millions in advanced medical technologies, their approach to protecting sensitive data remains notably ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results