Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Application Security Report 2022: Key Trends and Challenges

At a time when the state of cybersecurity is constantly changing, with new and increasing threats arising each day, it is vital for all organizations to keep it near the top of their list of priorities. Business applications are increasingly targeted by cybercriminals, and their ability to protect and defend themselves against these attacks is a crucial part of their operations.

How Egnyte Handles API Mocking: A Mirage.js Case Study

Mocking API requests for local development purposes or tests can be really cumbersome for frontend developers. The payload can be very large, identifiers of related entities must match, and besides that, sometimes we would like to get a completely different response depending on a use case. How do you avoid the extra work and avoid ending up with a mass of a half-duplicated code? At Egnyte, we cope with this challenge by using Mirage.js library.

Weak Cybersecurity is taking a toll on Small Businesses

Life among America’s nearly 32 million small businesses has never been easy. According to the Small Business Administration, about 20% of small business startups fail in their first year and half succumb to failure within five years. Bigger businesses have always had more capital, better access to loans, and more staying power.

The Democratization of Data: The Pros & Cons of All That Data

Try going one day without navigating today’s data landscape — accepting or declining cookie pop-ups, determining whether and how a company can use your information, and all the data you’re generating simply by browsing the web. Yes, we live in the Data Age. We know we generate mind-boggling amounts of data. The data we generate in a single day is an unfathomable amount (2.5 quintillion bytes if you can do that math). More formally, we say that data has been democratized.

Sponsored Post

An Introduction to Automation Basics

Automation is a powerful tool. With some foresight and a little elbow grease, you can save hours, days, or even months of work by strategically automating repetitive tasks. What makes automation particularly beneficial is that it eliminates manual interaction with multiple systems. Rather than manually uploading data to an event response system or notifying key support personnel of an incident, tying these tasks together through automation can reduce critical time and help resolve problems faster and more efficiently. But, before we can fill in the gaps between all of the platforms we are responsible for, we first need to understand how data moves around on the web and how we can use that process to our advantage.

7 cybersecurity challenges the finance sector faces (and how to avoid them)

The financial sector continues to be victimized by cyberattacks, making it the third-most targeted sector after healthcare and manufacturing. The finance sector alone reported 2,527 incidents, 690 of which ended up in disclosure of data. In the always vulnerable finance industry, it's critical for organizations to employ an endpoint management system in addition to an antivirus solution in order to shield themselves. Employing an endpoint management system that has built-in antivirus capabilities is an added advantage.

Guide to keeping cyber insurance premiums low amidst rising threats

Cyberattacks have become an unavoidable part of the technology landscape in recent years with attacks like ransomware, phishing, and whaling reaching an all-time high. According to IBM’s Cost of Data Breach Report 2022, the average cost of a ransomware attack is $4.54 million and the average cost of a breach in the US alone is $9.44 million. Cyber insurance is important in these instances, because it helps cover the financial losses incurred.

How to Prepare for a PCI DSS Audit in 7 Steps

Organizations of all sizes that store, process, or transmit credit card data must comply with PCI DSS (Payment Card Industry Data Security Standards). The PCI standard’s 12 principal requirements can prove challenging for organizations to achieve and maintain, especially those in the highly-regulated financial industry. An upcoming PCI compliance audit may be cause for concern for many organizations, who are left scrambling to ensure their cybersecurity practices are up to scratch.

Optimizing the CISO and Board Roles in Heightened Risk Periods

With companies in virtually every industry facing persistent and increasing cyber security threats, federal regulators are taking steps to protect customers and investors. In March, the SEC proposed new cyber security transparency rules that would require publicly traded companies to disclose, among other things, the cyber security expertise—or lack thereof—among their board members. This is despite the evidence that it is a recognized risk within businesses.