Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What Is the Average Cost of a Data Breach in India?

According to the IBM Security Data Breach Report of 2022, India's average data breach cost is at a record high of Rs 17.6 crore (Rs 175 million, which is around $2.2 million) for the fiscal year of 2022. This is a 6.6% increase from last year's Rs 16.5 crore and an uptick of 25% from the average cost of Rs 14 crore in 2020, as stated by IBM analysts.

What are the best practices in Digitizing Customer Onboarding? What are the technologies involved?

A new client’s onboarding in banking might take days of information gathering, application completion, identity verification, printing or emailing, and waiting for the consumer to sign and return the paperwork. Every day that goes by, increases the likelihood that the consumer may become impatient and discover more rapid competition. Additionally, manual paperwork attracts errors that contribute to costs and delays.

Synopsys and the new Automated Source Code Data Protection Measure have you covered

We break down the ASCDPM standard and how Synopsys application security testing tools can help customers implement this new guidance. In early August 2022, the Consortium for Information & Software Quality (CISQ) released a new specification, the Automated Source Code Data Protection Measure (ASCDPM). CISQ is an industry leadership group that develops international standards for automating the measurement of software size and structural quality from source code.

Modernize and Migrate to Egnyte to Replace Your Windows File Server

For decades, Microsoft’s Windows Server has been a mainstay for businesses of all sizes, most notably as a file server. However, as companies adapt to remote work, increasing cyber threats, and growing data privacy regulation, many are considering shifting their Windows file server to the cloud—or replacing it altogether. Egnyte is a great fit for companies looking to migrate their Windows file server to a modern platform designed for the new way of work.

5 Quick Takeaways from the Verizon Mobile Security Index 2022

Netskope is proud to have again contributed data and insights to Verizon’s annual Mobile Security Index, one of the most influential reports in the industry for evaluating mobile security trends. This report is based on a survey of hundreds of professionals responsible for buying, managing, and securing mobile and IoT devices, making it highly relevant to cybersecurity decision makers who deal with the challenges of hybrid work. Here are some of the highlights.

AsyncRAT: Using Fully Undetected Downloader

AsyncRAT is an open-source remote administration tool released on GitHub in January 2019. It’s designed to remotely control computers via encrypted connection, providing complete control via functionalities such as: Although the official GitHub repository contains a legal disclaimer, AsyncRAT is popularly used by attackers and even some APT groups. Netskope Threat Labs recently came across a FUD (Fully Undetected) Batch script which is downloading AsyncRAT from an Amazon S3 Bucket.

Our Commitment to Security: Rubrik Attains Microsoft Teams Backup & Restore Certification

Today, I’m excited to announce that Rubrik has achieved the status of a certified Backup & Restore provider for Microsoft Teams. We’re thrilled to demonstrate proficiency and commitment to meet Microsoft customers’ evolving needs in today’s security-first, cloud-first world and a distinguishing mark within Microsoft’s partner ecosystem.

Applying the principle of least privilege to Kubernetes using RBAC

The principle of least privilege (PoLP) is a defensive strategy in the software development world. Alternatively called the principle of minimal privilege or the principle of least authority, PoLP ensures that users can only access the systems, processes, networks, and files required to complete their assigned tasks. When properly configured, unauthorized users can’t navigate to restricted application functions or switch roles.

ROI of Automated Mobile App Security & Privacy Testing

Several companies aren't still aware of the fact that automated mobile app security testing brings better ROI than manual testing. Perhaps, they don't know what aspects of automation testing directly or indirectly impact the ROI. However, we got you covered. This blog discusses three almost hidden ways in which automation testing impacts and holds the potential to improve your ROI. And by the end, you'll be convinced to transition to complete automation testing.