Latest from todayNewsCISA chief uploaded sensitive government files to public ChatGPTMadhu Gottumukkala uploaded multiple “for official use only” contracting documents to OpenAI’s public platform, bypassing DHS-approved AI tools and triggering automated cyber alerts.By Gyana SwainJan 29, 20265 minsData PrivacyGenerative AIPrivacy News Reports of GDPR violations have risen sharplyBy Manfred BremmerJan 29, 20262 minsComplianceData BreachLaws and RegulationsNews Automated data poisoning proposed as a solution for AI theft threatBy Howard SolomonJan 7, 20266 minsArtificial IntelligenceData PrivacyPrivacy News‘Featured’ Urban VPN caught stealing private AI chatsBy Shweta Sharma Dec 16, 20253 minsArtificial IntelligenceData PrivacyPrivacy NewsEU ‘Chat Control’ proposals should be red flag to businesses everywhereBy Maxwell Cooter Nov 27, 20253 minsPrivacySecurity NewsIndia’s new data privacy rules turn privacy compliance into an engineering challengeBy Prasanth Aby Thomas Nov 17, 20254 minsData PrivacyGovernmentLaws and Regulations NewsNikkei's Slack breach leaks sensitive data from more than 17,000 usersBy Evan Schuman Nov 6, 20254 minsCyberattacksCybercrimeData Breach Opinion4 factors creating bottlenecks for enterprise GenAI adoptionBy Virendra Singh Panwar Oct 22, 202510 minsAPIsGenerative AIPrivacy NewsEx-lobbyist for Meta becomes Irish data protection commissionerBy Mikael Markander Sep 22, 20251 minLaws and RegulationsPrivacy ArticlesnewsCalifornia, two other states to come down hard on GPC violatorsInvestigative sweep targets businesses that may be failing to honor Global Privacy Control signals.By Paul Barker Sep 10, 2025 6 minsLaws and RegulationsPrivacynewsRelief for European Commission as court upholds EU Data Privacy Framework agreement with USLegal challenge by French MP rejected by the EU's General Court, but experts predict ruling will be appealed.By John E. Dunn Sep 3, 2025 5 minsComplianceLaws and RegulationsPrivacyanalysisThe 20 biggest data breaches of the 21st centuryData breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.By John Leyden, Dan Swinhoe and Michael Hill Jun 12, 2025 19 minsData BreachMalwarePhishingnewsData hoarding can have financial and security consequencesPoor end-of-life data management is hurting enterprise IT budgets and security posture.By Lynn Greiner Jun 5, 2025 1 minData and Information SecurityPrivacySecuritybrandpostSponsored by ProtivitiSafe at Any Speed: Formalizing Consumer Privacy Risk ManagementIn light of ever-increasing speed in time to market, new technology products and their updates can be rife with data privacy risks. Follow this guidance to manage the risk. By Jeffrey Sanchez Mar 22, 2022 4 minsPrivacynewsData on sale: Trump administration withdraws data broker oversight proposalWhile the US Consumer Financial Protection Bureau cites policy shifts and legal concerns, critics argue the move undermines consumer privacy protections.By Gyana Swain May 15, 2025 5 minsPrivacySecuritynewsMicrosoft OneDrive move may facilitate accidental sensitive file exfiltrationThe company plans to offer users with personal Microsoft accounts on business devices the option to sync their personal OneDrive content to the device in addition to their enterprise OneDrive files.By Evan Schuman May 9, 2025 8 minsPrivacySecuritynewsLesson from huge Blue Shield California data breach: Read the manualData on 4.7 million members was captured over almost four years from a misconfiguration that sent Google Analytics data to Google Ads. By Howard Solomon Apr 24, 2025 6 minsData BreachData and Information SecurityPrivacynewsNew data privacy act puts Indian companies on high alertWith the Digital Personal Data Protection Act set to become law soon, experts say there’s still a significant gap in awareness and implementation.By Nidhi Singal Apr 24, 2025 5 minsCompliancePrivacySecuritynewsSignal threatens to leave France if encryption backdoor requiredJust as it did with Sweden, Signal is refusing to stay in a territory that undermines its encryption strategy arguing that a backdoor in France would undermine protections for users worldwide.By Evan Schuman Mar 20, 2025 1 minData and Information SecurityEncryptionPrivacyfeatureHiring privacy experts is tough — here’s whyUnrealistic expectations by hiring managers paired with budget constraints are some of the impediments to hiring experts in privacy, on top of the constant changes to privacy regulations.By Aimee Chanthadavong Mar 13, 2025 7 minsHiringIT GovernancePrivacynewsVolkswagen massive data leak caused by a failure to secure AWS credentialsVW also failed to meet regulatory requirements for data security, and even violated its own terms of service, said analyst.By Evan Schuman Jan 2, 2025 3 minsComplianceData BreachPrivacynewsEuropean authorities say AI can use personal data without consent for trainingThe European Data Protection Board advised national regulators to allow personal data to be used for AI training, as long as the final product doesn’t reveal personal information.By Evan Schuman Dec 18, 2024 7 minsArtificial IntelligenceCompliancePrivacy Show more Show less View all Resources whitepaper Demystify AI complexity by partnering with industry leaders As enterprise AI initiatives take off, IT leaders are under increasing pressure to use AI to maximize competitive advantage The post Demystify AI complexity by partnering with industry leaders appeared first on Whitepaper Repository –. By Equinix 09 Feb 2026Artificial IntelligenceData ManagementIT Operations whitepaper Collaboration helps enterprises deploy flexible and scalable AI infrastructure By Equinix 09 Feb 2026Artificial IntelligenceBusiness OperationsInfrastructure Management whitepaper Unlock the Power of AI with a Hybrid Multicloud Environment – Whitepaper By Equinix 09 Feb 2026Artificial IntelligenceCloudNetwork Security View all Video on demand video Aligning security, compliance and privacy across inventory tracking Brad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD’s inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how they distribute security resources for appropriate levels of protection, maintain compliance with government regulations and industry standards, and leverage information security controls aligned with client requirements, industry frameworks and privacy regulations. May 28, 2021 20 minsComplianceData and Information SecurityPrivacy How the California Consumer Privacy Act (CCPA) will affect you and your business | TECH(talk) Sep 6, 2019 23 mins ComplianceGovernmentPrivacy Facebook faces billions in potential fines | TECH(feed) Apr 30, 2019 3 mins Data BreachGovernmentTechnology Industry 6 security reasons to upgrade to Windows 10 Jul 25, 2018 1 mins Application SecurityPrivacyWindows See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersCloud SecurityComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityRisk ManagementView all topics Show me morePopularArticlesPodcastsVideos news Windows shortcut weaponized in Phorpiex-linked ransomware campaign By Shweta SharmaFeb 10, 20264 mins CybercrimeMalwareRansomware news Single prompt breaks AI safety in 15 major language models By Gyana SwainFeb 10, 20266 mins Artificial IntelligenceGenerative AISecurity opinion How to govern agentic AI so as not to lose control By Gustavo FregaFeb 10, 20264 mins Artificial IntelligenceGenerative AISecurity podcast How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime podcast Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business podcast CSO Executive Session ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources video How Intelligence and AI Are Changing Cyber Defense | Erin Whitmore, Former CIA By Joan GoodchildFeb 4, 202628 mins CyberattacksCybercrime video Inside the SMB Threat Landscape: AT&T’s Senthil Ramakrishnan on Why Small Businesses Are Cybercrime’s Favorite Target By Joan GoodchildJan 13, 202623 mins CybercrimeSmall and Medium Business video CSO Executive Sessions ASEAN: The Human Firewall-Retention, AI Readiness, and Women in Cybersecurity By Estelle QuekJan 11, 202628 mins CyberattacksCybercrimeHuman Resources