Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Connected Folders Explained - and the Top-5 Reasons Users Need Them

Egnyte has always supported the ability to sync an online folder to a user’s desktop. Among other benefits, doing this provides increased performance when working with large files and allows anywhere access to files when offline. A connected folder works in reverse. It’s a folder within a user’s existing file structure that is automatically synced to the Egnyte Cloud.

Fuzzing Bitcoin with the Defensics SDK, part 2: Fuzz the Bitcoin protocol

In part two of this series, learn how to create a data model for the Bitcoin network protocol and use the Defensics SDK to perform fuzzing on bitcoind. In the previous article, you saw how to set up a test bed for bitcoind. We created two containers, fleur and viktor, and set up communication between the two bitcoind instances. In this article, learn how to create a data model for the Bitcoin network protocol, and then use this model in the Defensics® SDK to perform fuzzing on bitcoind.

Automate vulnerability analysis with the Datadog GitHub Action

To enhance and automate your vulnerability analysis, we’re excited to launch the Datadog Vulnerability Analysis GitHub Action. The action enables easy integration between your application, Datadog Continuous Profiler, and Snyk’s vulnerability database to provide actionable security heuristics. The action can be installed directly from the GitHub Marketplace, and does not require you to manage any additional scripts or infrastructure.

Is SIEM Suitable For My Organization?

Many people, when reviewing their security strategy, ask the question “is SIEM suitable for my organization”, or simply “is SIEM right for me?” And for a long time, the answer was “no unless you are a large multinational”. The price, the complexity and the hard-to-get value made SIEM a category suitable only for the big corporations with large security teams and budgets.

Is Your Language of Choice a Major Flaw Offender?

In volume 11 of our annual State of Software Security (SOSS) report, we uncovered some valuable nuggets of information about how you, the innovative developers of our world, can craft more secure code. For example, did you know that scanning via API improves the time to remediate 50 percent of security flaws by about 17 days, or that C++ and PHP languages have an alarmingly high number of severe security flaws and need greater attention?

The Olympics and Burner Phones: Are You Sure About the Safety of That QR Code?

As businesses try to create a contactless experience amid the coronavirus pandemic, many have turned to QR codes. We’re seeing a lot of restaurants using them to display their menus on smartphones and on receipts for a contactless pay option. Within popular apps like Snapchat and WhatsApp, QR codes are an integral part of the user experience. Users can use codes to sign into their account, exchange contact information and make money transfer.

12 Essential Tips for Keeping Your Email Safe

Hey, did you get that sketchy email? You know, the one from that malicious hacker trying to fool us into clicking on some malware? Boy, these criminals are relentless. Wait, what? You clicked on it? Uh-oh. A hypothetical scenario, but one that plays out every day in organizations across the globe — a very real scenario that provides a good reason to take a deep dive into the topic of email security. Here are some more good reasons.

Behind the Scenes with a CISO - What it Takes to Get More Sleep and Avoid Security Threats

Jason Ozin is the Group Information Security Officer at PIB, a fast-growing group of insurance advisory businesses in the UK, and Egnyte customer. Ozin is responsible for information security, cybersecurity, data governance, and compliance. PIB Group has grown rapidly since launching in 2015, building its team from 12 employees to over 1,400 today, through a combination of acquisitions and organic growth.