Code Scanner by Piiano Helps Enterprises Prevent Data Leaks Proactively

PRESS RELEASE. TEL AVIV, Israel, Nov. 29, 2023 - Piiano, the leading data protection company, today announced Piiano Flows, the industry's first privacy-centric static code analyzer. The company will offer free scans until the end of 2023. High-profile data leaks, including Duolingo's PII leak in late August, underscore the critical importance of data protection for businesses on a global scale. Flows automatically and continuously analyzes source code throughout development processes and tracks when, where and how sensitive data are being used and stored. This enables security teams to shift data security left with a more proactive approach. Piiano's tool finds potential data leaks inside source code and ensures that sensitive information, such as Personally Identifiable Information, credentials and financial information, are protected before faulty code reaches production. "Security leaders want to focus more on data security during development, but don't have the right tools to do so at scale and see what's happening with data in their code. Data vulnerabilities are even harder to hunt down after faulty code reaches production, which is why our tool nips the problem at the source," says Gil Dabah, co-founder and CEO of Piiano. Image shows sensitive data statistics gathered by analyzing a code repository. Developers are expected to work at a rapid pace and under a great deal of stress. Compounded by a lack of security expertise and orientation, they are prone to making errors through little fault of their own that can expose data at the code level-such as forgetting to remove debugging logs or inadvertently exposing sensitive data through public or third-party APIs. According to Justinian Fortenberry, CISO at Etsy and a board advisor to Piiano, "Piiano Flows is a very powerful and straightforward solution that, for the first time, enables enterprises to save time identifying potential data leaks during and after the application development process." Dabah likens Flows to a "SAST-type tool for proactive DPSM." The company's proprietary NLP ML model and taint analysis algorithms - a more accurate approach than more commonly used Large Language Models - maps and highlights any code that touches sensitive data, including incoming, outgoing and stored data, to help find data privacy and security issues and blind spots that can happen in runtime. Flows, available for free, is designed for quick and easy use with an intuitive interface for security teams. To eliminate third-party risk, it only requires access to code itself without ever accessing production environments or production data stores containing sensitive customer data. Piiano provides a data protection platform for app-sec and engineering teams to secure sensitive customer data and ensure their privacy - even in the event of a breach. Enterprises can scan their source code to find data leaks and similar data exposure issues and remediate them by securing the sensitive data by using its data protection APIs. With Piiano's building blocks, engineers and security leaders can save significant time, effort and resources while achieving true security without slowing down.

This Cyber News was published on www.darkreading.com. Publication date: Thu, 30 Nov 2023 20:25:01 +0000


Cyber News related to Code Scanner by Piiano Helps Enterprises Prevent Data Leaks Proactively

Code Scanner by Piiano Helps Enterprises Prevent Data Leaks Proactively - PRESS RELEASE. TEL AVIV, Israel, Nov. 29, 2023 - Piiano, the leading data protection company, today announced Piiano Flows, the industry's first privacy-centric static code analyzer. The company will offer free scans until the end of 2023. ...
10 months ago Darkreading.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
4 days ago Aws.amazon.com
Omdia: Standalone Security Products Outsell Cybersecurity Platforms - In its many briefings with cybersecurity vendors, one of the most consistent themes Omdia hears is why enterprises need cybersecurity platforms. Instead, vendors claim, enterprises could get better outcomes if they give up their multitude of ...
9 months ago Darkreading.com
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security - Data, especially personal data, drives the digital world. While digital systems continuously gather and use personal data to enhance user experience, there is a significant issue. The alarming frequency of data breaches indicates that the methods ...
9 months ago Securityboulevard.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Are you sure you want to share that with ChatGPT? How Metomic helps stop data leaks - Open AI's ChatGPT is one of the most powerful tools to come along in a lifetime, set to revolutionize the way many of us work. Workers aren't content to wait until organizations work this question out, however: Many are already using ChatGPT and ...
8 months ago Venturebeat.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
8 months ago Securityzap.com
A Solution to Discover and Remediate Data Security Risks in Hybrid Multicloud Environments - PRESS RELEASE. SANTA CLARA, Calif., Nov. 27, 2023 - Fortanix® Inc., a leader in data security and pioneer of Confidential Computing, today announced Key Insight, a new industry-first capability in the Fortanix Data Security Manager TM platform ...
10 months ago Darkreading.com
5 Reasons Why Your Business Needs Penetration Testing - Penetration testing is an essential security measure for businesses in the digital age. Cyber-attacks and data breaches are becoming more frequent, making it necessary for organizations to protect their sensitive data and web applications. A ...
1 year ago Tripwire.com
How Data Fabric Architecture Helps Enhance Security Governance - Essentially, data fabric is an approach to managing and integrating data, aimed at enabling access to information across the enterprise in a versatile, iterable, and augmented way. The data fabric concept can translate into an architecture that ...
4 months ago Cybersecurity-insiders.com
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
6 months ago Venturebeat.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
6 months ago Feeds.dzone.com
How to Keep Your Data Secure: Leaks, Breaches, Patches and Tweaks - In today’s world, data security is more important than ever. With the rise of cybercrime, data breaches, and security threats, it’s essential to stay vigilant when it comes to protecting your data. In this article, we discuss the latest news on ...
1 year ago Nakedsecurity.sophos.com
Flow Security Launches GenAI DLP - PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module. This move makes Flow Security the ...
10 months ago Darkreading.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
6 months ago Feeds.dzone.com
Truecaller AI Call Scanner detects AI voice clones in real-time - Illegitimate voice cloning and speech synthesis technologies are improving at an incalculable rate of change and are already commoditized and ubiquitous. This next wave of AI scams will prey on the most vulnerable side of our psyche: the threat of ...
4 months ago Helpnetsecurity.com
How to choose a free vulnerability scanner: Insights from an industry veteran - The cybersecurity market is awash with expensive, high-end solutions for detecting vulnerabilities in third-party applications. For smaller security teams, free vulnerability scanners offer a practical alternative. Free doesn't always mean ...
9 months ago Malwarebytes.com
An overview of storage encryption for enterprises - Storage encryption is a key element in keeping enterprise data safe. Most enterprises use a combination of encryption methods to protect their data on premises, in motion and in the cloud, so it's important to understand the different types and best ...
4 months ago Techtarget.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
3 days ago Securelist.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
9 months ago Helpnetsecurity.com
Vectra AI Launches Global, 24x7 Open MXDR Service Built to Defend Against Hybrid Attacks - PRESS RELEASE. San Jose, Calif. - February 15, 2024 - Vectra AI, Inc., the leader in hybrid attack detection, investigation and response, today announced the launch of Vectra MXDR services, the industry's first global, 24x7 open MXDR service built to ...
7 months ago Darkreading.com
Data Governance: MDM and RDM - Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. These goals may include providing reliable data for business operations, developing accurate analytics to assess ...
9 months ago Feeds.dzone.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
9 months ago Securityzap.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
9 months ago Feeds.dzone.com
Hacker leaks millions of new 23andMe genetic data profiles - A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking forum. Earlier this month, a threat actor leaked the stolen data of 1 million Ashkenazi Jews who used 23andMe ...
10 months ago Bleepingcomputer.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)