How Does Selective Modernization Prepare Firms for AI?

Data Security

How Does Selective Modernization Prepare Firms for AI?

As the EVP and Global CIO of Liberty Mutual and the Chief Technology and Operations Officer of Travelers respectively, Monica Caldas and Mojgan Lefebvre have navigated the complex intersection of legacy insurance systems and the high-compute demands of artificial intelligence. Their expertise highlights a shift in corporate strategy where

Hackers Use Legacy MSHTA Utility to Spread Windows Malware

Data Security

Hackers Use Legacy MSHTA Utility to Spread Windows Malware

Since the late 1990s, Microsoft has maintained a delicate balance between modern security and legacy support, a gap that threat actors have increasingly turned into a highway for silent infections. In this discussion, we explore the resurgence of MSHTA, a built-in Windows utility originally designed for HTML applications that has now become a

Gardiyan and QTLE Partner to Advance Time Lock Encryption

Data Security

Gardiyan and QTLE Partner to Advance Time Lock Encryption

In an age where digital intercepts occur in milliseconds, the ability to make data physically inaccessible until a specific calendar date represents the ultimate frontier in cybersecurity resilience. The strategic alliance between Gardiyan and QTLE marks a significant step forward in enterprise cybersecurity by integrating advanced Time Lock

The State of Data Loss Prevention in 2026: A Strategic Analysis

Data Security

The State of Data Loss Prevention in 2026: A Strategic Analysis

The rapid acceleration of digital transformation has forced a total re-evaluation of how sensitive information is protected within the modern enterprise environment. In the current year, organizations are no longer just defending local servers; they are securing a fluid stream of data that lives on employee devices, travels through dozens of

AWS Integrates Chainlink Standards to Scale Blockchain Data

Data Security

AWS Integrates Chainlink Standards to Scale Blockchain Data

The recent integration of Chainlink’s decentralized oracle standards into the Amazon Web Services Marketplace serves as a definitive signal that the wall between legacy cloud infrastructure and decentralized finance has finally been dismantled. This strategic alliance represents much more than a simple software update; it is a fundamental

Closing the Zero Trust Gap at Network Boundaries

Data Security

Closing the Zero Trust Gap at Network Boundaries

Connectivityisnottrustwhenmissiondecisionsrideonwhatcrossesaboundaryandonlyverifieddatashouldcount, yet brittle transfer layers still slow programs that otherwise appear mature, so the moment data moves becomes the moment trust is tested. That shift defined the core trend: policy often collapses at the edge between environments, where identity

1 2 3 4 30
1 2 30

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later