Aggregator
【深度研判】美国能源武器化能力评估,操纵全球油气市场对冲东大
揭秘KGB特工超强记忆术,7大训练技巧打造“最强大脑”
ChatGPT Go Launched for $8 USD/month With Support for Ads and Privacy Risks
OpenAI’s global rollout of its budget-friendly ChatGPT Go subscription at $8 USD monthly introduces significant data privacy and security considerations for cybersecurity professionals monitoring AI platform access controls. The tiered pricing structure, which includes an ad-supported model for free and Go users, fundamentally alters the threat landscape for organizational data exposure. The introduction of advertising […]
The post ChatGPT Go Launched for $8 USD/month With Support for Ads and Privacy Risks appeared first on Cyber Security News.
Apache bRPC Vulnerability Enables Remote Command Injection
A critical remote command-injection vulnerability has been discovered in Apache bRPC’s built-in heap profiler service, affecting all versions before 1.15.0 across all platforms. The vulnerability allows unauthenticated attackers to execute arbitrary system commands by manipulating the profiler’s parameter validation mechanisms. The heap profiler service endpoint (/pprof/heap) fails to properly sanitize the extra_options parameter before passing it to […]
The post Apache bRPC Vulnerability Enables Remote Command Injection appeared first on Cyber Security News.
Облако с сюрпризом. Как китайские провайдеры случайно приютили 18 тысяч хакерских серверов
Thales named Growth Index leader in Frost Radar™: Data Security Platforms Report
Thales named Growth Index leader in Frost Radar™: Data Security Platforms Report
madhav
Tue, 01/20/2026 - 04:29
Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The result is a fragmented security landscape where different tools protect different “data entry points” (databases, SaaS, endpoints, identities, access permissions, and more), often deployed at various times and with inconsistent context and policy enforcement.
Frost & Sullivan’s perspective is clear: data protection must be approached through a data lifecycle lens, where visibility, governance, security, and compliance are applied continuously as data changes type and state.
Data Security Lynne Murray | Director of Product Marketing for Data Security
More About This Author >
Data has always been the backbone of enterprise operations, but the rise of cloud, big data, and GenAI has multiplied its value and, with it, the motivation for attackers. In parallel, regulatory expectations are increasing and evolving. The result is a fragmented security landscape where different tools protect different “data entry points” (databases, SaaS, endpoints, identities, access permissions, and more), often deployed at various times and with inconsistent context and policy enforcement.
Frost & Sullivan’s perspective is clear: data protection must be approached through a data lifecycle lens, where visibility, governance, security, and compliance are applied continuously as data changes type and state.
That is the strategic imperative behind the modern Data Security Platform (DSP) category, and it is why Thales latest recognition matters.
In the Frost Radar™: Data Security Platforms benchmarking, Frost & Sullivan shortlisted 11 vendors and evaluated them across 10 Growth and Innovation criteria. The outcome?
Thales is recognized as the leader in the Growth Index and ranks second in the Innovation Index.
Per the report analysts: “Thales is the Growth Index leader on the Frost Radar™ thanks to its unmatched global footprint, diversified customer base, extensive channel ecosystem, and a growth rate that remains largely in line with the overall market’s.”
Frost & Sullivan further attributes this leadership to Thales’ extensive channel ecosystem and market-aligned growth rate.
The DSP imperative: one platform across the data lifecycleFrost & Sullivan argues that the “DSP” lens helps organizations move beyond acronym-driven point solutions and instead prioritize underlying capabilities tied together by a centralized policy and intelligence engine, enabling the controls to remain consistent across environments and data states.
From this lifecycle-centric view, the ideal DSP delivers core capabilities spanning:
- Data discovery and classification across structured and unstructured data stores.
- Access and identity governance to reduce exposure created by entitlements, identities, and permissions.
- Data protection and control mechanisms (e.g., encryption, tokenisation, masking, policy enforcement).
- Real-time detection and response anchored in rich context and behavioral analytics.
- Compliance enforcement and posture management with continuous assessment as data changes.
- Extended protection for data used in AI systems, including visibility into models and monitoring for anomalous behavior.
Frost & Sullivan’s assessment highlights the primary Thales differentiator: bringing together two historically separate domains - deep encryption and key management, plus real-time visibility and analytics - into a cohesive DSP approach, so sensitive data remains protected even if perimeter- or identity-based defenses are bypassed.
1. A multilayered architecture anchored in Thales CipherTrust DSP and the Data Security Fabric
Frost & Sullivan describes Thales DSP architecture as anchored by Thales CipherTrust DSP for centralized management of discovery, classification, encryption, key management, and tokenization, and complemented by Data Security Fabric for real-time visibility and risk analytics. This approach delivers “full-spectrum” protection across on-premises, hybrid, and cloud environments.
2. Defense-in-depth at the data layer
A key Innovation differentiator Frost & Sullivan calls out is Thales operational model: even if visibility or governance layers fail, sensitive data remains protected through specialized encryption techniques—an explicit defense-in-depth stance anchored at the data layer.
The report also details Thales capabilities for securing data at rest through centralized encryption, masking, and tokenization supported by unified key management and techniques such as transparent encryption, application protection via SDK, and database column-level encryption.
3. Visibility, analytics, and response—built to reduce false positives
Frost & Sullivan notes that the Data Security Fabric improves detection by combining predetermined rules with rich context, including access patterns and risk profiles derived from application/database traffic, enabling more accurate anomaly detection and more precise blocking. It also supports responses via native actions and automated workflows, with broad integrations across SIEM, XDR, DLP, CNAPP, and ticketing systems, as well as a catalog of over 2,000 pre-built integrations.
4. GenAI and forward-looking roadmap investments
On AI, Frost & Sullivan highlights capabilities to inventory AI models, audit access patterns, and profile LLM behavior for anomalies, alongside additional protections for LLM use cases, including RAG paired with CipherTrust Transparent Encryption. The roadmap direction cited includes deeper DevSecOps integration, more GenAI use cases, and investments toward quantum-resistant encryption.
5. Scale advantages that translate to Growth Index performance
Frost & Sullivan links Thales Growth leadership to execution capacity: global delivery across sectors (including BFSI, manufacturing, retail/eCommerce), amplification from the Imperva acquisition, flexible and scalable pricing (including volume-based licensing), and a go-to-market model combining direct sales with a partner ecosystem of 6,700 technology, service provider, and OEM partners. The report also cites operational depth, including 11 SOCs globally and multilingual support teams.
What this recognition signals for security and business leadersThe DSP market is expanding quickly. Frost & Sullivan cites a 2025 revenue growth expectation of 29.0% and a 2025–2030 CAGR anticipated at 23.2%, driven by the need for enterprises to prioritize unified visibility, consistent controls, and compliance across increasingly complex data estates.
Thales’ placement - #1 in Growth Index and #2 in Innovation Index - is a strong validation of a pragmatic DSP vision: unify governance and intelligence with robust data-layer protection, and extend that model to modern realities like multi-cloud, unstructured data, and GenAI.
Download the full Frost Radar™: Data Security Platform, 2025 report today.
studio THALES BLOG Thales named Growth Index leader in Frost Radar™: Data Security Platforms ReportJanuary 20, 2026
The post Thales named Growth Index leader in Frost Radar™: Data Security Platforms Report appeared first on Security Boulevard.
使用大模型提高安全分析工作效率
Минус 33% переходов из поиска за год. Почему вы всё реже кликаете на новости (и дальше будет только хуже)
Ransomware 'Most Wanted': Cops Seek Head of Black Basta
Police raided two suspected members of the notorious Black Basta ransomware group - tied to over 600 victims worldwide and many millions in ransom payments - in Ukraine and issued an international arrest warrant for the Russian national suspected of being the operation's founder and ringleader.
HHS Urges Health Sector to Harden Security of PHI, Devices
Federal regulators are advising regulated healthcare firms and their third-party vendors to harden systems, software and medical devices to better safeguard protected health information. Hardening is a necessary measure for protecting data privacy and security - as well as patient safety.
Aikido Gets $60M Series B to Scale, Automate AI Pen Testing
Backed by DST Global, Aikido Security's $60 million Series B will fund global expansion and boost its AI-powered security tools. CEO Willem Delbare said the firm's autonomous pen-testing and code remediation capability cuts cost, boosts software resilience and already outperforms humans.
Over-the-Air Software Updates Pose Risks to Vehicles
Over-the-air updates are an irreplaceable part of software-defined vehicles, giving manufacturers a convenient way of remotely fixing and upgrading vehicles. If not appropriately secured, over-the-air updates can become a gateway for data theft, malware injection, vehicle theft and even injury.
新型 Windows 恶意软件 PDFSider 入侵财富 100 强企业网络
网安自主化浪潮来袭:国产替代重塑全球产业格局,网安的重大利好才刚刚到来。
嘶吼快讯|网安厂商动态汇(第5期)
聚焦网安厂商最新动作,整合新品发布、战略合作、技术升级等核心动态,省去碎片化信息筛选时间,1 篇GET网安厂商近期关键动作!
网安厂商最新动态
360年度勒索软件流行态势报告发布:AI成未来勒索对抗决胜因素
近日,360数字安全集团以2025年全年勒索软件事件监测、分析与处置数据为基石,融合国内外一线安全态势数据、权威研究报告及国际热点事件情报,经综合研判梳理后,发布《2025年勒索软件流行态势报告》。
瑞数信息获评API安全推荐厂商,入选IDC《中国数据安全技术发展路线图,2025》
近日,IDC正式发布《中国数据安全技术发展路线图,2025》。瑞数信息成为IDC中国数据安全-API安全领域重点推荐的代表厂商。
观安信息9款产品入选CCIA《网络安全专用产品指南》
近日,中国网络安全产业联盟(CCIA)发布《网络安全专用产品指南》第三版。观安信息共有9款产品成功入选。
入选信通院典型案例,网易易盾携手云从科技交出政务大模型“安全答卷”
近日,由中国信息通信研究院云计算与大数据研究所组织开展的政务领域人工智能大模型应用典型案例征集结果公布。网易易盾联合国家网络安全人才与创新基地开展的“国家网安基地大模型训推一体化项目”成功入选。
芯盾时代中标湖南银行 破解特权账号管理难题
芯盾时代最新宣布中标湖南银行。帮助企业实现特权账号梳理、管理特权用户、识别账号风险、全局定期改密和完善安全审计等,全面提升企业特权账号的安全水平。
云天安全子公司正式入驻北京朝阳工业AI产业园
2026年1月,国信云天(北京)信息安全技术有限公司——山东云天安全技术有限公司旗下全资子公司正式迁入北京市朝阳区中关村(朝阳)工业AI产业园,进一步聚焦“AI+安全+工业”战略布局。
昆仑技术×可信华泰联合打造AI安全可信一体机解决方案
昆仑技术依托自主研发的服务器与KunLunOS操作系统,结合可信华泰在可信计算领域的优势,联合打造了通用及AI安全可信一体机解决方案。
明朝万达入选CCIA《网络安全专用产品指南》第三版
明朝万达两款核心产品——安元数据防泄漏系统、安元数据库安全审计系统成功入选CCIA《网络安全专用产品指南》。
通付盾销售智能体通过国家网信办备案
近日,国家互联网信息办公室正式公布第十五批深度合成服务算法备案信息,江苏通付盾信息安全技术有限公司自主研发的“通付盾销售智能体生成合成类算法”成功完成备案。
18家机构联合发布数据安全产品目录,天融信全品类上榜
近日,由中国信息通信研究院牵头,联合18家权威单位共同编制的《数据安全产品目录(2025年版)》正式发布。天融信数据分类分级系统、数据库审计系统、API安全审计系统、数据安全管理平台、数据脱敏系统五款产品成功入选,实现全品类覆盖。
信安世纪参编的4项密码行业标准发布,1项金融行业标准施行
日前,国家密码管理局发布第54号公告,批准公布了多项密码行业标准,自2026年7月1日起实施。其中,北京信安世纪科技股份有限公司参与了其中4项标准的编制工作。同时,依据中国证券监督管理委员会公告〔2026〕2号,信安世纪参编的金融行业推荐性标准JR/T 0347-2026 《证券期货业信息系统密码技术应用指引》已于2026年1月9日正式施行。
奇安信入选北京市可持续信息披露试点企业名单
近日,北京市财政局、北京市发展和改革委员会、北京市人民政府国有资产监督管理委员会联合发布《关于印发北京市通过可持续信息披露试点企业名单的通知》,奇安信集团成功入选北京市首批可持续信息披露试点企业名单。
江民科技与数字重庆政务科技达成技术生态合作
近日,江民科技与数字重庆政务科技达成技术生态合作,双方将围绕数字政府建设的安全需求,在政务安全解决方案、数据安全保障和信创生态适配等领域展开深度协作。
知道创宇大模型网关入选“巢燧”大模型创新应用案例
在第三届“大模型 大未来”人工智能大模型基准测试发展大会上,创宇“巢燧”大模型创新应用案例正式发布。
启明星辰五款产品入选国家级数据安全产品目录
在中国互联网产业年会“数据安全产业发展论坛”上,启明星辰共有五款产品成功入选《数据安全产品目录(2025年版)》,实现该目录五大产品类别全覆盖。
Digital Archeology: GotMeta Unearths Hidden Data from Target Domains
GotMeta A Python tool for discovering, downloading, and extracting metadata from publicly available files on target domains. Useful
The post Digital Archeology: GotMeta Unearths Hidden Data from Target Domains appeared first on Penetration Testing Tools.