Flow Security Launches GenAI DLP

PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module.
This move makes Flow Security the industry's first data security platform to safeguard the movement of data to GenAI services and applications, empowering enterprises to securely build with and consume GenAI. The widespread use of Generative AI, while leading to advancements across the enterprise and fueling exceptional innovation, has led to increasing concern over data security.
As more companies adopt GenAI services for a wide array of uses, from content creation to back-end tasks by developers, the potential for personal and corporate data leakage, data mishandling, and the creation of shadow data is on the rise.
A recent report found that 69% of executives say innovation takes precedence over cybersecurity for Generative AI, while at the same time, 96% say adopting GenAI makes a security breach likely in their organization within the next three years.
"Many companies that wish to venture into GenAI are hesitant to put themselves at risk due to concerns over data leakage, and they will continue to limit its usage as long as they remain unaware of how their data is moved, stored, and used by 3rd parties," said CEO of Flow Security, Jonathan Roizin.
"With GenAI DLP, we offer a responsible, frictionless way to safeguard corporate digital assets, enabling the wider adoption of GenAI applications across a data-centric ecosystem."
Analyzing data in motion, as opposed to traditional scanning of known databases, enables Flow's GenAI DLP to discover shadow data and proactively identify anomalies in real-time, regardless of where the data is located.
For data-centric organizations this capability is critical to prevent violations and breaches that could lead to fines and be damaging to their reputation.
In testing, Flow's GenAI DLP uncovered undetected data leakages despite seemingly robust infrastructure protection.
In a test focusing on healthcare organizations where GenAI was used to classify patient data to gain insights into disease patterns and treatment effectiveness, Flow's GenAI DLP quickly identified sensitive PHI data at risk that would have led to a HIPAA violation if it had continued to go unnoticed.
In another test for telecom providers, GenAI was used to optimize customer services by analyzing chatbot interactions for potential risk, and once again, Flow's GenAI DLP identified sensitive financial data leaks, thereby avoiding the potential repercussions.
"GenAI tools have created a situation where the movement of data is expanding at an unparalleled pace and relying on traditional infrastructure protection methods is inadequate to cover this data sprawl. To effectively monitor data's whereabouts, companies need to see the full journey, they can't rely on scanning data where it's supposed to be and once it is at rest - they need to know where the data actually is at all times," said CPO of Flow Security, Natia Golan.
See more details on Flow's new generative AI security module here.
Flow Security is the only data security platform that identifies, categorizes, and protects data at rest and in motion.
Utilizing advanced eBPF technology, Flow's solution uncovers unmanaged data on-prem and in the cloud, ensuring frictionless and comprehensive protection of sensitive information in ever-widening data landscapes.
Founded in 2021, Tel Aviv-based Flow is backed by Amiti, GFC, Amdocs Ventures, and market-leading angel investors.
To learn more about Flow Security, visit our website, or follow us on LinkedIn.


This Cyber News was published on www.darkreading.com. Publication date: Fri, 01 Dec 2023 22:20:07 +0000


Cyber News related to Flow Security Launches GenAI DLP

Flow Security Launches GenAI DLP - PRESS RELEASE. TEL AVIV, Israel, Nov. 30, 2023 /PRNewswire/ - Flow Security, the pioneering Data Security Lifecycle Platform, announced today its extension to GenAI Security with the launch of a new GenAI DLP module. This move makes Flow Security the ...
10 months ago Darkreading.com
Aim Security Raises $10M to Secure Generative AI Enterprise Adoption - PRESS RELEASE. TEL AVIV, Israel-(BUSINESS WIRE)-Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million in seed funding. Aim Security was founded by ...
8 months ago Darkreading.com
Akto Launches Proactive GenAI Security Testing Solution - With the increasing reliance on GenAI models and Language Learning Models like ChatGPT, the need for robust security measures have become paramount. Akto, a leading API Security company, is proud to announce the launch of its revolutionary GenAI ...
7 months ago Darkreading.com
AI Market Research: The Pivotal Role of Generative AI in Cyber Security - What researchers are learning about GenAI and cyber security. Pair AI with cyber security and the possibilities are staggering. For many security professionals, it's a foregone conclusion that incorporating intelligence into cyber security will ...
4 months ago Blog.checkpoint.com
GenAI Regulation: Why It Isn't One Size Fits All - With President Biden calling on Congress to pass bipartisan data privacy legislation to accelerate the development and use of privacy-centric techniques for the data that is training AI, it's important to remember that excessive regulation can stifle ...
7 months ago Cybersecurity-insiders.com
Cisco Motific reduces GenAI security, trust, and compliance risks - Cisco announced Motific, Cisco's SaaS product that allows for trustworthy GenAI deployments in organizations. Born from Outshift, Cisco's incubation business, Motific provides a central view across the entire GenAI journey, empowering central IT and ...
8 months ago Helpnetsecurity.com
11 GenAI cybersecurity surveys you should read - Generative AI stands at the forefront of technological innovation, reshaping industries and unlocking new possibilities across various domains. As the integration of these technologies continues, a vigilant approach to ethical considerations and ...
9 months ago Helpnetsecurity.com
CISOs Reconsider Their Roles in Response to GenAI Integration - Chief information security officers face mounting pressure as cyberattacks surge and complexities surrounding the implementation of GenAI and AI technologies emerge. The vast majority - 92% - of the 500 CISOs surveyed by Trellix admitted they are ...
4 months ago Securityboulevard.com
Skyhigh Security's AI-driven DLP Assistant prevents critical data loss - Skyhigh Security announced an AI-driven DLP Assistant as an advanced DLP capability within its Security Service Edge portfolio. The AI-based Assistant can help simplify many complex tasks in DLP with the ability to generate complex regular ...
8 months ago Helpnetsecurity.com
Legal, compliance and privacy leaders anxious about rapid GenAI adoption - Rapid GenAI adoption is the top-ranked issue for the next two years for legal, compliance and privacy leaders, according to Gartner. 70% of respondents reported rapid GenAI adoption as a top concern for them. Gartner experts have identified four key ...
9 months ago Helpnetsecurity.com
Beyond DLP: Embracing a Multi-Layered Strategy for Personal Data Security - Data, especially personal data, drives the digital world. While digital systems continuously gather and use personal data to enhance user experience, there is a significant issue. The alarming frequency of data breaches indicates that the methods ...
9 months ago Securityboulevard.com
CVE-2023-35934 - yt-dlp is a command-line program to download videos from video sites. During file downloads, yt-dlp or the external downloaders that yt-dlp employs may leak cookies on HTTP redirects to a different host, or leak them when the host for download ...
1 year ago
Businesses gain upper hand with GenAI integration - Firms that actively harness generative AI to enhance experiences, offerings, and productivity will realize outsized growth and will outpace their competition, according to Forrester. Between July and September 2023, the number of enterprises that are ...
10 months ago Helpnetsecurity.com
Cybersecurity trends: IBM's predictions for 2024 - As organizations begin planning their security strategies for 2024, now is the time to look back on the year before and extrapolate what the future may hold. The impact of the many new uses for GenAI rippled the cybersecurity world and was a top ...
9 months ago Securityintelligence.com
15% of office workers use unsanctioned GenAI tools - Help Net Security - Rigid security protocols — such as complex authentication processes and highly restrictive access controls — can frustrate employees, slow productivity and lead to unsafe workarounds, according to Ivanti. When employees have unfettered access to ...
1 week ago Helpnetsecurity.com
CIOs shape long-term success with GenAI expertise - Today's CIOs have evolved from managing IT infrastructure and ensuring systems' efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape ...
9 months ago Helpnetsecurity.com
CVE-2023-40581 - yt-dlp is a youtube-dl fork with additional features and fixes. yt-dlp allows the user to provide shell command lines to be executed at various stages in its download steps through the `--exec` flag. This flag allows output template expansion in its ...
1 year ago
GenAI development should follow secure-by-design principles - Given how dangerous the gold rush was and how long it took to incorporate safety measures, the time is now for organizations using GenAI to follow secure-by-design principles and follow CISA's example. Beyond writing faux movie scripts and passing ...
8 months ago Techtarget.com
Preventing PII Leakage through Text Generation AI Systems - Do an online search for ways to bypass text generation AI security filters, and you will find page after page of real examples and recommendations on how one can trick them into giving you information that was supposed to be blocked. This remains ...
10 months ago Securityboulevard.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
1 week ago Helpnetsecurity.com
Data Loss Prevention for Business: Strategies and Tools - Data Loss Prevention has become crucial in today's data-driven business landscape to protect sensitive information. This discussion aims to provide valuable insights into DLP strategies and tools for business, helping mitigate data loss risks ...
8 months ago Securityzap.com
Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest Problem - Cybersecurity professionals and technology innovators need to be thinking less about the threats from GenAI and more about the threats to GenAI from attackers who know how to pick apart the design weaknesses and flaws in these systems. Chief among ...
8 months ago Darkreading.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
5 months ago Blog.checkpoint.com
Wing Security unveils automated protection against AI-SaaS risks - Wing Security unveils an automatic advanced approach to counter the evolving risks of Intellectual Property and data leakage into GenAI applications. Amidst the growing adoption of GenAI, and the many SaaS applications powered by GenAI, Wing brings ...
8 months ago Helpnetsecurity.com
From Implicit to Authorization Code With PKCE, BFF - Lack of Refresh Token Support occurs when there are no refresh tokens, and frequent requests for new tokens are necessary, increasing the chances of token leakage and misuse. The Implicit Flow had several security vulnerabilities, such as token ...
3 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)