Cyera blog
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Aug 15, 2024
From AI to Identity: 5 Things Black Hat 2024 Taught Us About Modern Data Security
Thought Leadership

Aug 8, 2024
How Data Is The Key to Effective Incident Response
Product
Thought Leadership

Jul 31, 2024
Data and Identity are Two Sides of the Same Coin
Product
Thought Leadership
Jul 24, 2024
Minimizing The Blast Radius in The Uncharted World of AI Data Security
Thought Leadership

Jul 18, 2024
Five Data Security Challenges CISOs Are Facing Today
Thought Leadership

Jul 10, 2024
How DSPM Lays the Foundation for Data Privacy Compliance
Product
Thought Leadership

Jul 9, 2024
Leveraging Organizational Data for AI/ML and LLMs: A Strategic Framework
Thought Leadership

Jun 25, 2024
3 Reasons Data Access & Data Classification Are Crucial
Thought Leadership
May 31, 2024
Cyera and Cohesity Join Forces To Help Enterprises Discover and Protect Sensitive Data
Company

May 21, 2024
Say Hello to Our Newest Cyera Release - v20
Company
Product

May 16, 2024
Transforming Data Security: How AI and ML is Shaping the Next Generation of Data Security Tools
Thought Leadership
.avif)
Apr 9, 2024
Cheers to Our $300 Million Series C Round: Cyera’s Data Security Journey Surges On
Company

Mar 14, 2024
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
Thought Leadership

Feb 29, 2024
Data Retention and Breach Notification Obligations
Thought Leadership

Feb 1, 2024
New SEC Rules: Material Incident Reporting Through Cybersecurity Disclosures
Thought Leadership

Jan 3, 2024
Cloud Migration Risks: Overcoming the Data Security Challenges of Cloud Adoption
Thought Leadership
Product

Dec 19, 2023
An Overview of the EU AI Act
Thought Leadership

Nov 16, 2023
The Fundamentals of Data Security in Cloud Computing
Thought Leadership

Nov 1, 2023
Understanding the Risks of Azure SAS Tokens
Thought Leadership

Oct 17, 2023
DSPM vs Traditional Data Discovery Tools
Product
Thought Leadership

Oct 3, 2023
DSPM vs CSPM: Getting to Know Your Data Risks
Product
Thought Leadership

Sep 26, 2023
Get Ready for PCI DSS 4.0
Thought Leadership
Sep 19, 2023
Identifying and Protecting Sensitive Data During Mergers & Acquisitions
Thought Leadership

Sep 14, 2023
Microsoft Key Breach Incident by Storm-0558
Thought Leadership

Sep 8, 2023
Top 35 Data Security Statistics to Know in 2023
Thought Leadership

Aug 29, 2023
CCPA Data Security: What You Need to Know
Thought Leadership

Aug 23, 2023
HIPAA: Compliance Guide for the Security Leader
Thought Leadership

Aug 15, 2023
3 Opportunities Retailers Have to Deliver Value from Their Data
Thought Leadership

Aug 8, 2023
The Ultimate Data Security Itinerary For Travel Firms
Product
Thought Leadership

Aug 1, 2023
4 Reasons Data Discovery and Classification in DLP Is Broken (And How to Fix It)
Thought Leadership

Jul 25, 2023
The 5 Legal and Data Security Risks of AI Use in Software Development
Thought Leadership
Engineering
Product

Jul 18, 2023
3 Reasons Retailers Need to Add Data Security to Their Cart
Thought Leadership
Cyera Research
.png)
Apr 29, 2026
SplitSSHell - When a Comma Becomes Root How a Single Character Broke OpenSSH Certificate Authentication
Cyera Research
Apr 22, 2026
The Data Taxonomy Illusion: Why Security Teams Are Solving the Wrong Problem
Cyera Research
Mar 26, 2026
LangDrained: 3 Paths to Your Data Through LangChain, the World’s Most Popular AI Framework
Cyera Research

Mar 19, 2026
96% of Enterprise Permissions Go Unused. AI Agents Won't Leave Them That Way.
Cyera Research

Feb 23, 2026
The Long-Lived Risk of Malicious OAuth Applications: A Practical Threat Hunting Guide for M365
Cyera Research

Jan 26, 2026
Cellbreak: Grist’s Pyodide Sandbox Escape and the Data-at-Risk Blast Radius
Cyera Research

Jan 13, 2026
N8Scape (Pyodide sandbox escape): 9.9 Critical Post-Auth RCE in n8n (CVE-2025-68668)
Cyera Research

Dec 23, 2025
Escaping the Guest: How Custom LLM Workflows Uncovered Critical VMSVGA Vulnerabilities
Cyera Research

Dec 22, 2025
Why DSPM Has Moved From Buzzword to Board‑Level Mandate - and How Our New Guide Can Help
Cyera Research

Dec 5, 2025
The One Account That Breaks Everything: How Identity Outliers Create Explosive Risk
Cyera Research

Dec 2, 2025
Access Is the New Exposure: Why Knowing Who Can Reach Your Data Matters More Than Where It Lives
Cyera Research

Nov 25, 2025
Seeing the Forest: Why File-Level Classification Is the Missing Layer in Data Security
Cyera Research
.jpeg)
Nov 17, 2025
From Prompt to Exploit: Cyera Research Discloses Command & Prompt Injection Vulnerabilities in Gemini CLI
Cyera Research

Sep 29, 2025
Smarter at Scale: Why AI-Native Classification Techniques Outperform Exhaustive Scanning
No Results
We couldn't find what you were looking for, try changing the filters


.avif)














.png)












.avif)

.avif)