Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Tezos blockchain is now available on Fireblocks

Tezos, an open-source, decentralized blockchain focused on energy efficiency and scalability, is now available on Fireblocks. Fireblocks users can securely custody FA1.2 and FA2 token standards on Tezos and leverage Fireblocks’ Web3 Engine to build new products and services on the Tezos blockchain.

Tips for Building a SOC Analyst Home Lab

Do you aspire to become a standout in the SOC world? To excel, you must consistently cultivate both your technical hard skills and non-technical soft skills. No specific career path is the golden ticket; each individual’s journey to SOC stardom is a blend of conventional education and hands-on training, seasoned with vital real-world experience. A purpose-built SOC analyst home lab is one proven self-guided learning tool to sharpen your technical know-how.

Protecting Your Software Supply Chain: Understanding Typosquatting and Dependency Confusion Attacks

Typosquatting and dependency confusion are two common tactics used by hackers to exploit open-source package repositories. Understand how these attacks work and discover preventive measures to secure your infrastructure.

September Release Rollup: DXF File Preview in the iOS App, Support for Sharing Large Files Associated with Legal Holds, Ransomware Detection Sensitivity Adjustment, and More

This month's release rollup includes product updates and enhancements from Egnyte around DXF file preview in the iOS app, support for sharing large files associated with legal holds, and ransomware detection sensitivity adjustment. Below is a summary of these and other new releases. Visit the linked articles for more details.

Using Corelight to Identify Ransomware Blast Radius

Over the past few months, ransomware targeting healthcare organizations has been on the rise. While ransomware is nothing new, targeting healthcare organizations, at the extreme, can impact an organization’s ability to engage in anything from routine office visits to life-or-death diagnoses, treatments, and patient care.

Engaging Insiders to Combat Insider Threats

Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts to mitigate insider threats, current global risks and economic pressure are fueling the flame. There’s no silver bullet for insider threat protection, however a greater focus on culture, engagement and empowerment can make a real difference.