Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Adding Helm Chart Security Mitigation Notes to ChartCenter

Earlier this year, we launched ChartCenter, our newest community platform to help Kubernetes developers find Helm charts. This new free Helm central repository was built with chart immutability  in mind— meaning every version of a Helm chart and every version in ChartCenter will always be available even if the original source goes down.

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management.

Thoughts from the NCSC 2020 Annual Review

The National Cyber Security Centre (NCSC) released its annual review of 2020. If you are unfamiliar with the NCSC, part of their mission is that they are “dedicated to making the United Kingdom the safest place in the world to live and work online.” This is a lofty goal, and since the first report, issued in 2016, the NCSC remains steadfast in its vision. This year’s report, which spans the period from September 2019 through August 2020, contains many interesting insights.

ARMO Announces Nitro Enclave support - making it DevOps ready out of the box

Enabling enclaves-based security is key for enterprise cloud adoption General availability of Nitro Enclaves, recently announced by AWS, is Amazon’s way of delivering confidential computing to its customers. Following similar announcements by Microsoft Azure and Google Cloud, AWS announcement further confirms growing demand for additional runtime protection of customer’s data and other intellectual properties.

Get internet-level search to find your business content with Egnyte and BA Insight

Have you ever looked for a file but didn’t remember which application it was stored in? Did you perhaps wish the application had the same search capabilities as Google? As internet search continues to evolve and provide a better user experience, business leaders are mired with complaints because their knowledge workers search “store-by-store” and can’t find what they are looking for inside their organization’s file share or cloud-content repositories.

How Software Can Help With A Digital Workforce Transformation

A growing number of businesses are allowing their employees to work remotely for at least part of their work week. Right now, it’s estimated that 42% of workers in the U.S. are working from home. Even though working from home is becoming more common, many companies have still not taken the necessary steps to complete their digital workforce transformation. The key to successfully shifting to remote work is keeping tabs on your team with the help of employee monitoring software.

Adopting a BYOD policy amid the COVID-19 era

In the midst of the COVID-19 pandemic, even companies that had said no to BYOD have come to terms with it, as a fair share of remote work would not even be possible without such a policy. Pandemic or no pandemic, on-the-go data access has always enabled employees to get work done quickly and efficiently. It guarantees better communication with colleagues, improves customer service, and device familiarity brings employee satisfaction and increased productivity.

Two cybersecurity hygiene actions to improve your digital life in 2021

It is that time of year again where we start planning resolutions for the coming year. A good start is putting cybersecurity on the top of the list whether you are a business or individual. According to a University of Maryland study, Hackers attack every 39 seconds, on average 2,244 times a day. It may be even higher now that more of us are working remotely because of Covid19 and the attack surface has greatly expanded in numbers and vulnerability.

Facts About Computer Viruses & Malware (including 6 Virus Myths)

Our article provides an overview of the most common forms of computer viruses along with some punches of computer fun facts, history & interesting facts about computer viruses and other types of malware. A few weeks ago, we also published cyber security glossary, simplifying geeky terms for general readers.