Sentra Launches Breakthrough AI Classification Capabilities!
All Resources
In this article:
minus iconplus icon
Share the Blog

Spooky Stories of Data Breaches

October 28, 2024
3
Min Read
Data Security

As Halloween approaches, it’s the perfect time to dive into some of the scariest data breaches of 2024. Just like monsters hiding in haunted houses, cyber threats quietly move through the digital world, waiting to target vulnerable organizations.

The financial impact of cyberattacks is immense. Cybersecurity Ventures estimates global cybercrime will reach $9.5 trillion in 2024 and $10.5 trillion by 2025. Ransomware, the top threat, is projected to cause damages from $42 billion in 2024 to $265 billion by 2031.

If those numbers didn’t scare you, the 2024 Verizon Data Breach Investigations Report highlights that out of 30,458 cyber incidents, 10,626 were confirmed data breaches, with one-third involving ransomware or extortion. Ransomware has been the top threat in 92% of industries and, along with phishing, malware, and DDoS attacks, has caused nearly two-thirds of data breaches in the past three years.

Let's explore some of the most spine-tingling breaches of 2024 and uncover how they could have been avoided.

Major Data Breaches That Shook the Digital World

The Dark Secrets of National Public Data

The latest National Public Data breach is staggering, just this summer, a hacking group claims to have stolen 2.7 billion personal records, potentially affecting nearly everyone in the United States, Canada, and the United Kingdom. This includes American Social Security numbers. They published portions of the stolen data on the dark web, and while experts are still analyzing how accurate and complete the information is (there are only about half a billion people between the US, Canada, and UK), it's likely that most, if not all, social security numbers have been compromised.

The Haunting of AT&T

AT&T faced a nightmare when hackers breached their systems, exposing the personal data of 7.6 million current and 65.4 million former customers. The stolen data, including sensitive information like Social Security numbers and account details, surfaced on the dark web in March 2024.

Change Healthcare Faces a Chilling Breach

In February 2024, Change Healthcare fell victim to a massive ransomware attack that exposed the personal information of millions of individuals, with 145 million records exposed. This breach, one of the largest in healthcare history, compromised names, addresses, Social Security numbers, medical records, and other sensitive data. The incident had far-reaching effects on patients, healthcare providers, and insurance companies, prompting many in the healthcare industry to reevaluate their security strategies.

The Nightmare of Ticketmaster

Ticketmaster faced a horror of epic proportions when hackers breached their systems, compromising 560 million customer records. This data breach included sensitive details such as payment information, order history, and personal identifiers. The leaked data, offered for sale online, put millions at risk and led to potential federal legal action against their parent company, Live Nation.

How Can Organizations Prevent Data Breaches: Proactive Steps

To mitigate the risk of data breaches, organizations should take proactive steps. 

  • Regularly monitor accounts and credit reports for unusual activity.
  • Strengthen access controls by minimizing over-privileged users.
  • Review permissions and encrypt critical data to protect it both at rest and in transit. 
  • Invest in real-time threat detection tools and conduct regular security audits to help identify vulnerabilities and respond quickly to emerging threats.
  • Implement Data Security Posture Management (DSPM) to detect shadow data and ensure proper data hygiene (i.e. encryption, masking, activity logging, etc.) 

These measures, including multi-factor authentication and routine compliance audits, can significantly reduce the risk of breaches and better protect sensitive information.

Best Practices to Secure Your Data 

Enough of the scary news, how do we avoid these nightmares?

Organizations can defend themselves starting with Data Security Posture Management (DSPM) tools. By finding and eliminating shadow data, identifying over-privileged users, and monitoring data movement, companies can significantly reduce their risk of facing these digital threats.

Looking at these major breaches, it's clear the stakes have never been higher. Each incident highlights the vulnerabilities we face and the urgent need for strong protection strategies. Learning from these missteps underscores the importance of prioritizing data security.

As technology continues to evolve and regulations grow stricter, it’s vital for businesses to adopt a proactive approach to safeguarding their data. Implementing proper data security measures can play a critical role in protecting sensitive information and minimizing the risk of future breaches.

Sentra: The Data Security Platform for the AI era

Sentra enables security teams to gain full visibility and control of data, as well as protect against sensitive data breaches across the entire public cloud stack. By discovering where all the sensitive data is, how it's secured, and where it's going, Sentra reduces the 'data attack surface', the sum of all places where sensitive or critical data is stored or traveling to.Sentra’s cloud-native design combines powerful Data Discovery and Classification, DSPM, DAG, and DDR capabilities into a complete Data Security Platform (DSP). With this, Sentra customers achieve enterprise-scale data protection and answer the important questions about their data. Sentra DSP provides a crucial layer of protection distinct from other infrastructure-dependent layers. It allows organizations to scale data protection across multi-clouds to meet enterprise demands and keep pace with ever-evolving business needs. And it does so very efficiently - without creating undue burdens on the personnel who must manage it.

Haim has extensive experience working with large organizations interested in enhancing their data security in the cloud.

Subscribe

Latest Blog Posts

Nikki Ralston
Nikki Ralston
Romi Minin
Romi Minin
December 16, 2025
3
Min Read

Sentra Is One of the Hottest Cybersecurity Startups

Sentra Is One of the Hottest Cybersecurity Startups

We knew we were on a hot streak, and now it’s official.

Sentra has been named one of CRN’s 10 Hottest Cybersecurity Startups of 2025. This recognition is a direct reflection of our commitment to redefining data security for the cloud and AI era, and of the growing trust forward-thinking enterprises are placing in our unique approach.

This milestone is more than just an award. It shows our relentless drive to protect modern data systems and gives us a chance to thank our customers, partners, and the Sentra team whose creativity and determination keep pushing us ahead.

The Market Forces Fueling Sentra’s Momentum

Cybersecurity is undergoing major changes. With 94% of organizations worldwide now relying on cloud technologies, the rapid growth of cloud-based data and the rise of AI agents have made security both more urgent and more complicated. These shifts are creating demands for platforms that combine unified data security posture management (DSPM) with fast data detection and response (DDR).

Industry data highlights this trend: over 73% of enterprise security operations centers are now using AI for real-time threat detection, leading to a 41% drop in breach containment time. The global cybersecurity market is growing rapidly, estimated to reach $227.6 billion in 2025, fueled by the need to break down barriers between data discovery, classification, and incident response 2025 cybersecurity market insights. In 2025, organizations will spend about 10% more on cyber defenses, which will only increase the demand for new solutions.

Why Recognition by CRN Matters and What It Means

Landing a place on CRN’s 10 Hottest Cybersecurity Startups of 2025 is more than publicity for Sentra. It signals we truly meet the moment. Our rise isn’t just about new features; it’s about helping security teams tackle the growing risks posed by AI and cloud data head-on. This recognition follows our mention as a CRN 2024 Stellar Startup, a sign of steady innovation and mounting interest from analysts and enterprises alike.

Being on CRN’s list means customers, partners, and investors value Sentra’s straightforward, agentless data protection that helps organizations work faster and with more certainty.

Innovation Where It Matters: Sentra’s Edge in Data and AI Security

Sentra stands out for its practical approach to solving urgent security problems, including:

  • Agentless, multi-cloud coverage: Sentra identifies and classifies sensitive data and AI agents across cloud, SaaS, and on-premises environments without any agents or hidden gaps.
  • Integrated DSPM + DDR: We go further than monitoring posture by automatically investigating incidents and responding, so security teams can act quickly on why DSPM+DDR matters.
  • AI-driven advancements: Features like domain-specific AI Classifiers for Unstructure advanced AI classification leveraging SLMs, Data Security for AI Agents and Microsoft M365 Copilot help customers stay in control as they adopt new technologies Sentra’s AI-powered innovation.

With new attack surfaces popping up all the time, from prompt injection to autonomous agent drift, Sentra’s architecture is built to handle the world of AI.

A Platform Approach That Outpaces the Competition

There are plenty of startups aiming to tackle AI, cloud, and data security challenges. Companies like 7AI, Reco, Exaforce, and Noma Security have been in the news for their funding rounds and targeted solutions. Still, very few offer the kind of unified coverage that sets Sentra apart.

Most competitors stick to either monitoring SaaS agents or reducing SOC alerts. Sentra does more by providing both agentless multi-cloud DSPM and built-in DDR. This gives organizations visibility, context, and the power to act in one platform. With features like Data Security for AI Agents, Sentra helps enterprises go beyond managing alerts by automating meaningful steps to defend sensitive data everywhere.

Thanks to Our Community and What’s Next

This honor belongs first and foremost to our community: customers breaking new ground in data security, partners building solutions alongside us, and a team with a clear goal to lead the industry.

If you haven’t tried Sentra yet, now’s a great time to see what we can do for your cloud and AI data security program. Find out why we’re at the forefront: schedule a personalized demo or read CRN’s full 2025 list for more insight.

Conclusion

Being named one of CRN’s hottest cybersecurity startups isn’t just a milestone. It pushes us forward toward our vision - data security that truly enables innovation. The market is changing fast, but Sentra’s focus on meaningful security results hasn't wavered.

Thank you to our customers, partners, investors, and team for your ongoing trust and teamwork. As AI and cloud technology shape the future, Sentra is ready to help organizations move confidently, securely, and quickly.

Read More
Meni Besso
Meni Besso
December 15, 2025
3
Min Read

AI Governance Starts With Data Governance: Securing the Training Data and Agents Fuelling GenAI

AI Governance Starts With Data Governance: Securing the Training Data and Agents Fuelling GenAI

Generative AI isn’t just transforming products and processes - it’s expanding the entire enterprise risk surface. As C-suite executives and security leaders rush to unlock GenAI’s competitive advantages, a hard truth is clear: effective AI governance depends on solid, end-to-end data governance.

Sensitive data is increasingly used for model training and autonomous agents. If organizations fail to discover, classify, and secure these resources early, they risk privacy breaches, regulatory violations, and reputational damage. To make GenAI safe, compliant, and trustworthy from the start, data governance for generative AI needs to be a top boardroom priority.

Why Data Governance is the Cornerstone of GenAI Trustworthiness and Safety

The opportunities and risks of generative AI depend not only on algorithms, but also on the quality, security, and history of the underlying data. AWS reports that 39% of Chief Data Officers see data cleaning, integration, and storage as the main barriers to GenAI adoption, and 49% of enterprises make data quality improvement a core focus for successful AI projects (AWS Enterprise Strategy - Data Governance). Without strong data governance, sensitive information can end up in training sets, leading to unintentional leaks or model behaviors that break privacy and compliance.

Regulatory requirements, such as the Generative AI Copyright Disclosure Act, are evolving fast, raising the pressure to document data lineage and make sure unauthorized or non-compliant datasets stay out. In the world of GenAI, governance goes far beyond compliance checklists. It’s essential for building AI that is safe, auditable, and trusted by both regulators and customers.

New Attack Surfaces: Risks From Unsecured Data and Shadow AI Agents

GenAI adoption increases risk. Today, 79% of organizations have already piloted or deployed agentic AI, with many using LLM-powered agents to automate key workflows (Wikipedia - Agentic AI). But if these agents, sometimes functioning as "shadow AI" outside official oversight, access sensitive or unclassified data, the fallout can be severe.

In 2024, over 30% of AI data breaches involve insider threats or accidental disclosure, according to Quinnox Data Governance for AI. Autonomous agents can mistakenly reveal trade secrets, financial records, or customer data, damaging brand trust. The risk multiplies rapidly if sensitive data isn’t properly governed before flowing into GenAI tools. To stop these new threats, organizations need up-to-the-minute insight and control over both data and the agents using it.

Frameworks and Best Practices for Data Governance in GenAI

Leading organizations now follow data governance frameworks that match changing regulations and GenAI's technical complexity. Standards like NIST AI Risk Management Framework (AI RMF) and ISO/IEC 42001:2023 are setting the benchmarks for building auditable, resilient AI programs (Data and AI Governance - Frameworks & Best Practices).

Some of the most effective practices:

  • Managing metadata and tracking full data lineage
  • Using data access policies based on role and context
  • Automating compliance with new AI laws
  • Monitoring data integrity and checking for bias

A strong data governance program for generative AI focuses on ongoing data discovery, classification, and policy enforcement - before data or agents meet any AI models. This approach helps lower risk and gives GenAI efforts a solid base of trust.

Sentra’s Approach: Proactive Pre-Integration Discovery and Continuous Enforcement

Many tools only secure data after it’s already being used with GenAI applications. This reactive strategy leaves openings for risk. Sentra takes a different path, letting organizations discover, classify, and protect sensitive data sources before they interact with language models or agentic AI.

By using agentless, API-based discovery and classification across multi-cloud and SaaS environments, Sentra delivers immediate visibility and context-aware risk scoring for all enterprise data assets. With automated policies, businesses can mask, encrypt, or restrict data access depending on sensitivity, business requirements, or audit needs. Live Continuous monitoring tracks which AI agents are accessing data, making granular controls and fast intervention possible. These processes help stop shadow AI, keep unauthorized data out of LLM training, and maintain compliance as rules and business needs shift.

Guardrails for Responsible AI Growth Across the Enterprise

The future of GenAI depends on how well businesses can innovate while keeping security and compliance intact. As AI regulations become stricter and adoption speeds up, Sentra’s ability to provide ongoing, automated discovery and enforcement at scale is critical. Further reading: AI Automation & Data Security: What You Need To Know.

With Sentra, organizations can:

  • Stop unapproved or unchecked data from being used in model training
  • Identify shadow AI agents or risky automated actions as they happen
  • Support audits with complete data classification
  • Meet NIST, ISO, and new global standards with ease

Sentra gives CISOs, CDOs, and executives a proactive, scalable way to adopt GenAI safely, protecting the business before any model training even begins.

AI Governance Starts with Data Governance

AI governance for generative AI starts, and is won or lost, at the data layer. If organizations don’t find, classify, and secure sensitive data first, every other security measure remains reactive and ineffective. As generative AI, agent automation, and regulatory demands rise, a unified data governance strategy isn’t just good practice, it’s an urgent priority. Sentra gives security and business teams real control, making sure GenAI is secure, compliant, and trusted.

<blogcta-big>

Read More
Ward Balcerzak
Ward Balcerzak
December 11, 2025
3
Min Read

US State Privacy Laws 2026: DSPM Compliance Requirements & What You Need to Know

US State Privacy Laws 2026: DSPM Compliance Requirements & What You Need to Know

By 2026, American data privacy will look very different as a wave of new state laws redefines what it means to protect sensitive information. Organizations face a regulatory maze: more than 20 states will soon require not only “reasonable security” but also Data Protection Impact Assessments (DPIAs), explicit limits on data collection, and, in some cases, detailed data inventories. These requirements are quickly becoming standard, and ignoring them simply isn’t an option. The risk of penalties and enforcement actions is climbing fast.

But through all these changes, one major question remains: How can any organization comply if it doesn’t even know where its most sensitive data is? Data Security Posture Management (DSPM) has become the solution, making data visibility and automation central for meeting ongoing compliance needs.

Mapping the New Wave of State Privacy Mandates

Several state privacy laws going into effect in 2025 and 2026 are raising the stakes for compliance. Kentucky, Indiana, and Rhode Island’s new laws, effective January 1, 2026, require both security measures and DPIAs for handling high-risk or sensitive data. Minnesota’s law stands out even more: it moves past earlier vague “reasonable” security language and mandates comprehensive data inventories.

Other key states include Minnesota, which explicitly requires data inventories, Maryland with strict data minimization rules, and Tennessee, which gives organizations an affirmative defense if they’ve adopted a NIST-aligned privacy program. These requirements mean organizations now need to track what data they collect, know exactly where it’s stored, and show evidence of compliance when asked. If your organization operates in more than one state, keeping up with this web of laws will soon become impossible without dedicated solutions (US consumer privacy laws 2025 update).

Why Data Visibility is Now Foundational to Compliance

To meet DPIA, minimization, and security safeguard rules, you need full visibility into where sensitive or regulated data lives - and how it moves across your environment. Recent privacy laws are moving closer to GDPR-like standards, with DPIAs required not only for biometric data but also for broad categories like targeted advertising and profiling. Minnesota leads with its clear requirement for full data inventories, setting the standard that you can’t prove compliance unless you understand your data (US cybersecurity and data privacy review and outlook 2025).

This shift puts DSPM front and center: you now need ongoing discovery and classification of your entire sensitive data footprint. Without a strong data foundation, organizations will find it hard to complete DPIAs, handle audits, or defend themselves in investigations.

Automation: The Only Viable Path for Assessment and Audit Readiness

State privacy rules are getting more complicated, and many enforcement authorities are shortening or removing 'right-to-cure' periods. That means manual compliance simply won’t keep up. Automation is now the only way to manage compliance as regulations tighten (5 trends to watch: 2025 US data privacy & cybersecurity).

With DSPM and automation, organizations get ongoing discovery, real-time data classification, and instant evidence collection - all required for fast DPIAs and responsive audits. For companies facing regulators or preparing for multi-state oversight, this means you already have the proof and documentation you need. Relying on spreadsheets or one-time assessments at this point only increases your risk.

Sentra: Your Strategic Bridge to Privacy Law Compliance

Sentra’s DSPM platform is built to tackle these expanding privacy law requirements. The agentless platform covers AWS, Azure, GCP, SaaS, and hybrid environments, removing both visibility gaps and the hassle found in older solutions (Sentra: DSPM for compliance use cases).

With continuous, automated discovery and data classification, you always know exactly where your sensitive data is, how it moves, and how it’s being protected. Sentra’s integrated Data Detection & Response (DDR) catches and fixes risks or policy violations early, closing gaps before regulators - or attackers - can take advantage (Sensitive data exposure insight). Combined with clear reporting and on-demand audit documentation, Sentra helps you meet new state privacy laws and stay audit-ready, even as your business or data needs change.

Conclusion

The arrival of new state privacy laws in 2025 and 2026 is changing how organizations must handle sensitive data. Security safeguards, DPIAs, minimization, and full inventories are now required - not just nice-to-have.

DSPM is now a compliance must-have. Without complete data visibility and automation, following the web of state rules isn’t difficult - it’s impossible. Sentra’s agentless, multi-cloud platform keeps your organization continuously informed, giving compliance, security, and privacy teams the control they need to keep up with new regulations.

Want to see how your organization stacks up for 2026 laws? Book a DSPM Compliance Readiness Assessment or check out Sentra’s automated DPIA tools today.

<blogcta-big>

Read More
decorative ball
Expert Data Security Insights Straight to Your Inbox
What Should I Do Now:
1

Get the latest GigaOm DSPM Radar report - see why Sentra was named a Leader and Fast Mover in data security. Download now and stay ahead on securing sensitive data.

2

Sign up for a demo and learn how Sentra’s data security platform can uncover hidden risks, simplify compliance, and safeguard your sensitive data.

3

Follow us on LinkedIn, X (Twitter), and YouTube for actionable expert insights on how to strengthen your data security, build a successful DSPM program, and more!

Before you go...

Get the Gartner Customers' Choice for DSPM Report

Read why 98% of users recommend Sentra.

Gartner Certificate for Sentra