Latest Articles
-
Cyber Threats
‘Mother of All Breaches’: Everything You Need to Know about 26B Records Data Leak
Users of popular services — including Twitter, Dropbox, LinkedIn, Adobe, Canva, and Telegram — have been shocked by the discovery this week of a "super beach" of 26 billion records of user info. The breach, which has quickly become known as the "Mother of All Breaches" (MOAB), includes 12 terabytes...
By: Tim Keary | Technology Writer -
Uncategorized
What is SAS? Microsoft’s 38TB Leak Exposes Data Sharing Risks
A major data leak at Microsoft illustrates the importance of implementing robust security processes, as the company has revealed that an employee accidentally disclosed an "overly permissive" shared access signature (SAS) token while training an artificial intelligence (AI) model. When even the biggest tech multinational companies can expose themselves to...
By: Nicole Willing | Technology Journalist -
Cyber Threats
Top 10 Cybersecurity Threats 2025: How to Protect Your Data
Cybersecurity threats are getting more advanced, and 2025 is expected to bring new challenges for businesses. From ransomware to AI-powered cyberattacks and insider threats, companies face serious risks that can expose sensitive data and cause major disruptions. Hackers are using smarter tools and finding new ways to target businesses. In...
By: Linda Rosencrance | Technology Journalist -
Cybersecurity
10 Everyday Apps That Put Your Data at Risk in 2025: How to Protect Yourself?
The number of apps that we just can't do without keeps increasing every day. But could your favorite messaging or music apps leak your private information, making you easier targets for hackers? Leaked data can include your browser history, financial information, and location. Within the framework of cybersecurity awareness month,...
By: Indrabati Lahiri | Financial writer and editor -
Cloud Computing
Cloud Exit: 42% of Companies Move Data Back On-Premises
Today, we are in a strange phase shift between widespread cloud adoption and the emerging trend of 'Cloud Exit' — with most businesses settling somewhere in between. Initially drawn by the promise of cost savings and increased flexibility, companies are now taking steps to right-size their cloud usage based on...
By: Kaif Shaikh | Tech Journalist -
Cybersecurity
The Cost of a Data Breach in 2024
As data breaches continue to grow in severity and frequency, so too do their costs. The global average cost of a data breach in 2024 has increased by 10% in just one year, reaching $4.88 million. What are the common reasons for data breaches in 2024? How long do breaches...
By: Maria Webb | Technology Journalist -
Cyber Threats
Inside Jack Teixeira’s Pentagon Leak & Looming DoD Deadline: Expert Analysis
The Jack Teixeira leaked classified documents scandal saw highly classified documents about the Russia-Ukraine war, leaked along with many other national security secrets, catching the Pentagon unawares. Following the leaks, the Pentagon has instructed the deployment of mandatory security measures for all government and federal facilities managing classified or sensitive...
By: Ray Fernandez | Senior Technology Journalist -
Artificial Intelligence
AI Was Meant to Make Data Decisions Easier — Not Harder
AI was believed to take data-driven organizations to the next level. However, experts and organizations are realizing that integrating artificial intelligence into data frameworks is trickier than originally thought. AI not only generates and moves vast amounts of data, but untraceable data biases in training datasets can lead to biased...
By: Ray Fernandez | Senior Technology Journalist -
Artificial Intelligence
AI May Be Smart, But it is Dumb About Giving Away Your Data
If you are already a fan of ChatGPT and the wealth of chatbots springing up, chances are you have on occasionals thrown personal (or company) information into your prompts. The magic and convenience of instant answers outweighing the “do not put sensitive information” warnings — maybe it is worth the...
By: Ray Fernandez | Senior Technology Journalist -
Cybersecurity
Only 2% of Workers Can Access Company Data Within a Week – But Why?
A new report shows that less than 2% of workers can access sensitive and classified data in less than a week — with 69% having to wait more than a month. Even more shockingly, some workers reported having to wait three to six months to get the data they needed,...
By: Ray Fernandez | Senior Technology Journalist