Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Meaningful security metrics

Security metrics are vital for you as a security leader to track the progress of your security program and have effective risk-focused conversations with business and operations stakeholders. Security metrics pave the way for security initiatives, facilitate resource, help communicate resource allocation and help communicate results with relevant stakeholders throughout the organization.

Kaseya Ransomware Attack: How It Affects MSSPs and SMEs, and What to Do to Prevent It

A cybercrime organization with Russian origins called REvil claims to have infected 1 million systems across 17 countries. It is now demanding $ 70 million in bitcoins in exchange for a “universal decryptor” that will return users’ access. Hackers targeted the US IT company Kaseya, and then used that company’s software to infiltrate the victims’ systems, using a zero-day vulnerability.

Tips for hardening your container image security strategy

In the first part of this blog series, we looked at security best practices for the base images which you might be using. But what happens to container image security when we add other things to it? Perhaps we’re installing additional software from upstream, and we’ve got custom applications of our own which might have their own dependencies also being installed.

What are Advanced Persistent Threats (APT attacks)

An Advanced Persistent Threat is a sophisticated (rarely) multi-staged attack carried out by skilled and well-organised threat actors such as organised cybercrime syndicates and nation-state actors. The majority of the times, Advanced Persistent Threats (APT) are nothing more than a fancy name with much more media frenzy around the topic of cyber attacks.

The Network Leader's Punch List for Returning to the Office

Over the last year and a half, we all went through the monumental disruption of having just about everyone work from remote locations. We strained VPN infrastructure and out of necessity split tunnels became the norm, not the exception. Even if it meant the users were a bit more exposed, you really had no choice, as Zoom/Webex/Teams meetings can eat up bandwidth like nobody’s business. But now the users are starting to come back into the office, what’s the big deal?

Key Takeaways for Developers From SOSS v11: Open Source Edition

Our latest State of Software Security: Open Source Edition report just dropped, and developers will want to take note of the findings. After studying 13 million scans of over 86,000 repositories, the report sheds light on the state of security around open source libraries – and what you can do to improve it. The key takeaway? Open source libraries are a part of pretty much all software today, enabling developers to work faster and smarter, but they’re not static.

What are Product Security Incident Response Team (PSIRT) Best Practices?

In my previous post, I disclosed that SonicWall had quietly released vulnerability fixes over the course of several days before vulnerability advisories were published for CVE-2020-5135. Rather than properly fixing CVE-2020-5135, SonicWall’s fix introduced a new vulnerability in the same code. SonicWall was aware of the new vulnerability but deferred the small fix until the next release, more than 6 months later.

Protecting the Supply Chain in COVID-19

Supply chain cybersecurity is important at all times, but arguably even more so during the COVID-19 crisis. If a hack compromises the speedy delivery of vaccines, medical equipment, or drugs used to treat people suffering from the virus, everyone involved could face devastating consequences. Here are some proactive steps people can take to keep their sensitive supply chain data safe.

Collect, Store, and Collaborate with Egnyte for Life Sciences

Modern drug discovery and clinical trials produce a volume of data that can quickly overwhelm local storage and bandwidth capacity. Sequencing data, scanned source files, biostatistical (SAS, R, SPSS) databases, and DICOM imaging are all hard to store and collaborate on, especially with a distributed workforce. Egnyte’s platform has been facilitating secure sharing of files for over a decade, accelerating the ability to collaborate without sacrificing security.

Report: Data Management Trends in Life Sciences

Organizations in the life sciences industry need to maintain regulated data in compliance with a number of global data privacy laws. Ideally, compliance is automatically ensured, and data is easily categorized. But we all know that this is not always the case in a decentralized, dynamic environment. So, how are the leading biotechs efficiently and securely managing collaboration and data?