Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Egnyte Releases Open Source Bandwidth Limiting Plugin

Bandwidth pricing is a major component of the cloud services model. And for a content-heavy service like a video or document store, egress costs can quickly spiral out of control. To mitigate this, it is important to put limits on the amount of data that can be downloaded in a given interval. However, bandwidth limiting for a multi-tenant SaaS product adds a few interesting challenges.

I Left the Founding Team at Uber Eats to Build the Developer Tool I Always Needed

Data stewardship and protection of customer data is likely to become one of the largest challenges for businesses this decade, with a growing number of countries considering data privacy legislation. For example, in 2020, 30 states within the US considered data privacy bills; that number increased to 38 in 2021. This wave of legislation, kicked off by GDPR, started around 2016 when the world entered the Zettabyte era.

Announcing the Nightfall Developer Platform - APIs for Building Data Protection into Any Application

Nightfall’s vision is to power data protection in every app or service. Our native SaaS integrations for apps like Slack, GitHub, and Google Drive already protect organizations, ranging from small startups to the Fortune 100, against data leaks with our machine learning-powered detection engine. Today, we’re excited to announce the launch of the Nightfall Developer Platform, so you can build data discovery, classification, and protection using our powerful APIs.

4 Components of Modern Data Classification & Protection Infrastructure

Data privacy is top of mind for every organization, with individuals wanting reassurance that their data is secure at all times. With the ever increasing number of cloud applications on the market today, security teams are faced with the challenge of keeping track of compounding volumes of sensitive data that can flow internally, externally, and across systems.

OT Security: Risks, Challenges and Securing your Environment

Before the revolution of Information Technology (IT), the world experienced the revolution of Operational Technology (OT). Operational Technology is the combination of hardware and software that controls and operates the physical mechanisms of industry. OT systems play an important role in the water, manufacturing, power, and distribution systems that transformed industry into the modern age. All of these systems function to operate, automate, and manage industrial machines.

13 spooky security threats that happened in 2021

Alan is one of the senior officers of a financial bank in Texas. Alan was looking to buy a Halloween costume and got an email about a sale happening at a store near his neighborhood. He clicked on the email to learn more about the offer. In a few hours, his computer, which had critical high-profile customer files and details got infected by ransomware.

Debunked: Is a subdomain takeover 'game over' for companies?

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource ethical hacker Thomas Chauchefoin, while expired and forgotten subdomains can easily become an entrypoint for an attacker to steal sensitive data, a robust attack surface management programme in place can keep them at bay.