Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

ICYMI: 3 Takeaways from a Former Healthcare CISO on Managing Cloud Data Security Risks

Last month, we hosted a webinar with our CISO, Karim Beldjilali, who was formerly the CISO of Rightway a healthcare startup. Karim shared important security lessons for healthcare organizations leveraging cloud applications across their workforce. We briefly share the highlights below.

The Biggest Cloud Security Challenges in 2023 and How to Avoid Them

With the rapid growth of cloud technology, it is no surprise that security has become a major concern for organizations. Cloud computing provides numerous advantages in terms of cost savings and scalability, but these benefits come with risks. As businesses move to the cloud, they must be aware of the potential security threats and take appropriate steps to protect their data and systems from malicious actors.

Security Enablement in a World of Digital Transformation

39% of organizations already use low-code and another 27% plan to start doing so in the next year (Forrester). By 2025 more than 70% of all application development will be done using no-code/low-code (LCNC), according to Gartner. LCNC is already everywhere – so what does that mean for your business?

Eight Things to Consider if You're Considering ChatGPT

Since ChatGPT was released by OpenAI last year, large language models like it have gone viral. Cheerleaders extol these AI models as the future of work, maybe the best thing to happen since the invention of the internet, or as the invention that changes everything. Detractors point to their gaffs, failures, and “hallucinations.” Both Google and Microsoft have been embarrassed in the last several days by the outputs of their respective chatbots.

Setting Up a New eTMF Study in Egnyte

Egnyte’s eTMF allows you to assemble all the critical documentation related to your clinical trial so that you stay on track and audit-ready. Running your own eTMF gives you full visibility and control over data that is critical to the success of your company. In this article, you’ll learn how to set up a new study in Egnyte’s eTMF app.

What is Apple Code Signing Certificate?

You must have seen various online resources about removing Unknown Publisher Warning on windows systems. And using a code signing certificate with Windows utility tools. But, as a macOS and iOS developer, that is of no use to you, as it would not be compatible with Apple’s ecosystem. However, it doesn’t mean that there’s no software security solution for macOS apps. To make an application for Apple devices tamper-proof, you can avail of the Apple Code Signing Certificate.

3 Ways To Address Your Kubernetes Data Protection Challenges

Kubernetes is an open-source container orchestration tool originally developed by Google for managing microservices or containerized applications across a distributed cluster of nodes. It is widely thought that “Kubernetes is key” to cloud-native application strategies. Kubernetes (K8s) runs over several nodes, and the collection of nodes is called a cluster. K8s clusters allow application developers to orchestrate and monitor containers across multiple physical, virtual, or cloud servers.

Integrating Cybersecurity in UX design

The digital landscape has ensured a wider range of businesses has access to a truly global marketplace. On one hand, this helps bolster a thriving entrepreneurial ecosystem. However, it also means there is a significant amount of competition. If your company’s website or mobile application doesn’t provide a stellar user experience (UX), consumers are able and willing to go elsewhere. Yet, in the online environment, UX is not your only consideration.

Bloor Research: Managed Detection and Response - 2023 Market Update

Bloor analyzed the most often cited MDR providers delivering technology-agnostic services and named Kroll a Champion. Nearly three years since Bloor Research analyzed the managed detection and response (MDR) landscape, its 2023 MDR Market Update shows a maturing market sector where vendors go beyond endpoint detection and response (EDR) to ingest a variety of telemetry, including cloud services, and develop more robust incident response (IR).

Strengthening Defenses Against Advanced Cloud and Email Threats with Netskope and Mimecast

The widespread adoption of cloud transformation and hybrid work are increasing the attack surface while attacks get increasingly sophisticated. Attacks targeting cloud infrastructure and email-borne threats have soared to unprecedented levels, making it critical for organizations to protect sensitive data regardless of where it may be stored.