Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection

Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM solution.
As a result of update to Concentric AI's Semantic Intelligence, organizations can now protect sensitive data communicated in meetings using Zoom, Microsoft Teams, WebEx, and other popular collaboration tools for the first time.
Until today's announcement, sensitive data discovery in audio and video files did not exist in the industry.
With virtual meetings such a popular form of communication, proprietary data is commonly transferred through audio and video files.
Given the sensitive nature of these discussions, content containing confidential information could jeopardize the company's competitive edge and reputation if mishandled.
Without detection and protection of sensitive data shared in virtual meetings, there is a widening gap in data security in what's become an increasingly large attack surface.
While the sheer versatility and complexity of audio and video data presents a unique detection and categorization challenge, Concentric AI's solution is the only one capable of this complex functionality.
The solution uniquely transcribes content shared and discussed in virtual meetings.
Next its AI-driven platform understands the content and context of each transcribed audio and video file to accurately detect sensitive data without false positives.
This is impossible to do using standard rules and regular expressions, given the unstructured and unpredictable nature of conversations.
Concentric AI's Semantic Intelligence DSPM solution scans organizations' data, detects sensitive or business critical content, identifies the most appropriate classification category, and automatically tags the data.
Concentric AI uses artificial intelligence to improve discovery and classification accuracy and efficiency to avoid endless regex rules and inaccurate end user labeling.
Concentric AI can monitor and autonomously identify risk to financial and other data from inappropriate permissioning, wrong entitlements, risky sharing, and unauthorized access.
It can automatically remediate permissions and sharing issues or leverage other security solutions and cloud APIs to quickly and continuously protect exposed data.
Concentric AI's Semantic Intelligence automates unstructured and structured data security using deep learning to categorize data, uncover business criticality and reduce risk.
Its Risk Distance analysis technology uses the baseline security practices observed for each data category to spot security anomalies in individual files.
It compares documents of the same type to identify risk from oversharing, third-party access, wrong location, or misclassification.
Organizations benefit from the expertise of content owners without intrusive classification mandates, with no rules, regex, or policy maintenance needed.


This Cyber News was published on www.helpnetsecurity.com. Publication date: Thu, 14 Dec 2023 13:43:05 +0000


Cyber News related to Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection

Concentric AI expands Semantic Intelligence DSPM capabilities with audio and video data protection - Concentric AI unveiled that its Semantic Intelligence DSPM solution now offers sensitive data discovery, identification, risk monitoring, and remediation protection for audio and video files, furthering the data protection capabilities of its DSPM ...
6 months ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
DSPM deep dive: debunking data security myths The Register - Partner Content There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge; its recent buzz has brought scrutiny to various security concepts that have cluttered the ...
7 months ago Go.theregister.com
The Irrefutable Case for Customer-Native DSPM - The counterpoint to these awful statistics is the emergence of data security posture management, which involves the continuous assessment, monitoring, and enhancement of an organization's data security. While some DSPM providers advocate traditional ...
2 months ago Securityboulevard.com
2024 brings changes in data security strategies - 2024 will be a revolutionary year for the data security landscape as Data Security Posture Management technology rapidly evolves to keep pace with the colossal amount of data being created, stored and shared within organizations and across business ...
7 months ago Helpnetsecurity.com
How Can DSPM Prevent High-Profile Breaches? - In early October 2023, a DNA testing company for ancestry discovery purposes, 23andMe, disclosed that it suffered a data breach. On the 5th of December 2023, the company shared that the data breach was more damaging than was initially reported. On ...
6 months ago Gbhackers.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
6 months ago Securityzap.com
What is Azure Identity Protection and 7 Steps to a Seamless Setup - As a result, tools such as Microsoft's Azure Identity Protection have become a staple in protecting against compromised identities, account takeover, and misuse of privileges. Azure Identity Protection is a security service that provides a robust ...
1 month ago Securityboulevard.com
CVE-2007-0018 - Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the ...
5 years ago
Rubrik EPE secures enterprise data from cyberattacks - Artificial intelligence, digital transformation, and the Internet of Things have caused a data explosion, leading organizations to grapple with a surging amount of fragmented data where it lives. Rubrik released Rubrik Enterprise Proactive Edition, a ...
3 months ago Helpnetsecurity.com
WebRTC vs. RTSP: Understanding the IoT Video Streaming Protocols - At the moment, there is a constantly increasing number of smart video cameras collecting and streaming video throughout the world. Here's what you need to know about WebRTC vs. RTSP and their suitability for various streaming needs. The Basics of ...
5 months ago Feeds.dzone.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
3 months ago Feeds.dzone.com
5 Valuable Skills Kids Can Gain by Playing Video Games - Video games come in all shapes and sizes and can be very educational for children of all ages. Video games can provide children with valuable skills that can help them in their everyday lives. From problem-solving abilities to self-control, learning ...
1 year ago Welivesecurity.com
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity - In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous ...
5 months ago Helpnetsecurity.com
LLMs Open to Manipulation Using Doctored Images, Audio - Such attacks could become a major issue as LLMs become increasingly multimodal or are capable of responding contextually to inputs that combine text, audio, pictures, and even video. Hiding Instructions in Images and Audio At Black Hat Europe 2023 ...
7 months ago Darkreading.com
CVE-2021-22283 - Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB ...
1 year ago
Cybersecurity Compliance: Understanding Regulatory Frameworks - Data breaches continue to increase year over year: there was a 20% increase in data breaches from 2022 to 2023 and globally and there were twice the number of victims in 2023 as compared to 2022. Compliance frameworks vary by industry, region, and ...
2 months ago Offsec.com
eSentire Threat Intelligence reduces false positive alerts - eSentire launched its first standalone cybersecurity product, eSentire Threat Intelligence, extending eSentire's protection and automated blocking capability across firewalls, threat intelligence platforms, email services and endpoint agents. ...
3 months ago Helpnetsecurity.com
Securing the Digital Frontier - As we navigate through a world brimming with data, understanding the evolving landscape of data protection is not just a necessity but a responsibility. This intricate dance among technology, societal norms, and regulatory frameworks shapes our ...
5 months ago Feeds.dzone.com
How to Use Threat Intelligence Feeds for SOC/DFIR Teams - Threat intelligence feeds provide real-time updates on indicators of compromise, such as malicious IPs and URLs. Security systems can then ingest these IOCs to identify and block potential threats, which essentially grants organizations immunity to ...
1 month ago Cybersecuritynews.com
How to Overcome the Most Common Challenges with Threat Intelligence - Today's typical approach to threat intelligence isn't putting organizations in a place to do that. Instead, many threat intelligence tools are delivering too much uncurated and irrelevant information that arrives too late to act upon. Organizations ...
6 months ago Cyberdefensemagazine.com
Python in Threat Intelligence: Analyzing and Mitigating Cyber Threats - In the world of emerging cybersecurity threats, understanding the significance of threat intelligence is crucial and can not be ignored. Threat intelligence involves the systematic collection, analysis, and application of data to understand potential ...
5 months ago Hackread.com
Data Governance: MDM and RDM - Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. These goals may include providing reliable data for business operations, developing accurate analytics to assess ...
6 months ago Feeds.dzone.com
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security - Data, especially personal data, drives the digital world. While digital systems continuously gather and use personal data to enhance user experience, there is a significant issue. The alarming frequency of data breaches indicates that the methods ...
6 months ago Securityboulevard.com
Cybersixgill Announces Identity Intelligence Module for Threat Analysis - PRESS RELEASE. Tel Aviv, Israel - December 6, 2023 - Cybersixgill, the global cyber threat intelligence data provider, announced today new features and capabilities that take security teams' threat detection and mitigation efforts to new levels, ...
7 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)