Cyera blog
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No Results
We couldn't find what you were looking for, try changing the filters

Feb 1, 2024
New SEC Rules: Material Incident Reporting Through Cybersecurity Disclosures
Thought Leadership

Jan 3, 2024
Cloud Migration Risks: Overcoming the Data Security Challenges of Cloud Adoption
Thought Leadership
Product

Dec 19, 2023
An Overview of the EU AI Act
Thought Leadership

Nov 16, 2023
The Fundamentals of Data Security in Cloud Computing
Thought Leadership

Nov 1, 2023
Understanding the Risks of Azure SAS Tokens
Thought Leadership

Oct 17, 2023
DSPM vs Traditional Data Discovery Tools
Product
Thought Leadership

Oct 3, 2023
DSPM vs CSPM: Getting to Know Your Data Risks
Product
Thought Leadership

Sep 26, 2023
Get Ready for PCI DSS 4.0
Thought Leadership
Sep 19, 2023
Identifying and Protecting Sensitive Data During Mergers & Acquisitions
Thought Leadership

Sep 14, 2023
Microsoft Key Breach Incident by Storm-0558
Thought Leadership

Sep 8, 2023
Top 35 Data Security Statistics to Know in 2023
Thought Leadership

Aug 29, 2023
CCPA Data Security: What You Need to Know
Thought Leadership

Aug 23, 2023
HIPAA: Compliance Guide for the Security Leader
Thought Leadership

Aug 15, 2023
3 Opportunities Retailers Have to Deliver Value from Their Data
Thought Leadership

Aug 8, 2023
The Ultimate Data Security Itinerary For Travel Firms
Product
Thought Leadership

Aug 1, 2023
4 Reasons Data Discovery and Classification in DLP Is Broken (And How to Fix It)
Thought Leadership

Jul 25, 2023
The 5 Legal and Data Security Risks of AI Use in Software Development
Thought Leadership
Engineering
Product

Jul 18, 2023
3 Reasons Retailers Need to Add Data Security to Their Cart
Thought Leadership

Jul 5, 2023
Top 4 Security Vulnerabilities to Sensitive Data in AWS Message Queues and Tips to Protect it
Product
Engineering

Jun 20, 2023
Purpose Limitation Compliance with OpenAI
Thought Leadership
Product

Jun 13, 2023
4 Ways Marketing & Sales Teams Are Using Generative AI
Thought Leadership

Jun 7, 2023
Data Security for Software Companies: Protecting Sensitive Information Using a Modern Approach
Thought Leadership

Jun 6, 2023
OpenAI is Accelerating our Development of Automated Data Security Insights
Company
News
Thought Leadership
May 31, 2023
5 Data Types Semiconductor Companies Need to Secure
Thought Leadership
Product

May 24, 2023
On the 5 Year Anniversary of GDPR, AI-powered Data Security Provides a Path to Compliance
Company
Product
News
Thought Leadership

May 17, 2023
SafeType™ from Cyera Labs Supports Safe Generative AI Experimentation
Product
Company
Engineering

May 16, 2023
5 Data Security Regulatory Requirements for Financial Services
Product
Thought Leadership
May 9, 2023
Inconsistent Data Security Controls: When the Same Data Is Both Encrypted and Exposed
Product
Thought Leadership

May 2, 2023
Misplaced Data: How a Modern Data Security Platform Can Help Keep Data Where it Belongs
Product
Thought Leadership

Apr 21, 2023
3 Essential Requirements of Advanced PII Data Classification
Product
Thought Leadership

Mar 21, 2023
Simplifying the Complexity of Data Security
Thought Leadership
Product
Cyera Research

Mar 26, 2026
LangDrained: 3 Paths to Your Data Through LangChain, the World’s Most Popular AI Framework
Cyera Research

Mar 19, 2026
96% of Enterprise Permissions Go Unused. AI Agents Won't Leave Them That Way.
Cyera Research

Feb 23, 2026
The Long-Lived Risk of Malicious OAuth Applications: A Practical Threat Hunting Guide for M365
Cyera Research

Jan 26, 2026
Cellbreak: Grist’s Pyodide Sandbox Escape and the Data-at-Risk Blast Radius
Cyera Research

Jan 13, 2026
N8Scape (Pyodide sandbox escape): 9.9 Critical Post-Auth RCE in n8n (CVE-2025-68668)
Cyera Research

Dec 23, 2025
Escaping the Guest: How Custom LLM Workflows Uncovered Critical VMSVGA Vulnerabilities
Cyera Research

Dec 22, 2025
Why DSPM Has Moved From Buzzword to Board‑Level Mandate - and How Our New Guide Can Help
Cyera Research

Dec 5, 2025
The One Account That Breaks Everything: How Identity Outliers Create Explosive Risk
Cyera Research

Dec 2, 2025
Access Is the New Exposure: Why Knowing Who Can Reach Your Data Matters More Than Where It Lives
Cyera Research

Nov 25, 2025
Seeing the Forest: Why File-Level Classification Is the Missing Layer in Data Security
Cyera Research

Nov 17, 2025
From Prompt to Exploit: Cyera Research Labs’ Discloses Command & Prompt Injection Vulnerabilities in Gemini CLI
Cyera Research

Sep 29, 2025



























.avif)

.avif)