Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Situational awareness for CISA FECB playbooks

CISA recently released a set of playbooks for the Federal Civilian Executive Branch (FCEB) to provide improved cybersecurity incident response (IR) and vulnerability response. As was demonstrated by the SolarWinds SUNBURST attack in December 2020, coordination and reporting across the FCEB continues to be a challenge. Adding to this challenge is the situation where agencies have differing playbooks on how to handle confirmed malicious cyber activity where a major incident has been identified.

Zoom Monitoring with Tripwire Configuration Manager

Last month, we covered how Tripwire Configuration Manager can audit your cloud service provider accounts like AWS, Azure, GCP, and other cloud-based services such as Salesforce. In this blog, we will continue our dive into cloud services and show how Tripwire Configuration Manager can monitor your Zoom environments. Zoom is a popular video telecommunications platform that has seen tremendous growth in the past few years.

Holiday phishing season: Your guide to staying scam-safe

For many of us, the Thanksgiving and Christmas period is a chance for some well-deserved downtime. For cybercriminals, not so much. The holiday season is one of the most productive time of the year for the Phishing-as-a-Service (PhaaS) industry. Online retail sales spike around holidays, creating more opportunities to catch people out with phishing emails and spoofed websites.

November Release Rollup: Dark Mode, Confidence Scores, and More

As we enter the holiday season, Egnyte is excited to share a number of updates to its platform, including user experience improvements, new governance functionality, and enhancements to search on mobile. Check out some of our top product releases for November below.

How To Protect Sensitive Data with Cloud DLP

A recent report from IBM found that data breach costs rose from $3.86 million to $4.24 million in 2021. This year’s estimate is the highest average total cost in the 17-year history of the IBM Cost of a Data Breach Report. Partly, the record-setting cost of a data breach has to do with the fact that so many companies are working remotely.

Social Engineering Part 2: Sophisticated social engineering techniques

Social Engineering is a form of security fraud that relies on psychological manipulation techniques to trick people into revealing sensitive information. In the previous article in this series, we discussed what social engineering is in more detail, the social engineering lifecycle, its reliance on human error, and some of the more common social engineering techniques.

Fileless attacks: a cybersecurity insight to be taken into account

Hackers are highly trained cybercriminals with access to resources capable of compromising a system in an organization without being detected. And malwareless attacks – where cybercriminals access critical business networks without malware – are on the rise.

Why Does LimaCharlie Exist?

Security is an active market with new vendors emerging regularly. Here is a ”simple” example of what has become a common way to group companies in a logical way - a so-called cybersecurity technology map: This is a lot to take in, yet the above chart is one of the simplest illustrations available when searching “cybersecurity technology map”. A reasonable question could be - how did we get here?

What You Can Learn About Cyber Security from the Biggest Breaches in History

It feels like cybersecurity is dominating the newsfeeds, doesn’t it? There is a reason. Cyberattacks and cybercrime have risen dramatically in the last five years. 2020 broke all records in terms of data loss and the number of cyberattacks. Between 2019 and 2020 ransomware attacks alone rose by 62%, the same year that the World Economic Forum identified cyberattacks and data theft as two of the biggest risks to the global economy.

The ultimate Microsoft 365 management and security tool

The hybrid work environment is a significant and challenging change we have embraced in the past two years due to the pandemic. And Microsoft 365 continues to be the most commonly chosen cloud-based work suite with 50.2 million users around the world. With cloud-based products, all we need is internet connectivity. The people, files and data we work with travel with us, irrespective of where we work from. Microsoft 365 comes with a wide array of features to simplify collaboration and communication.