Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

What You Should Know About npm Packages 'colors' and 'faker'

On January 8, 2022, the open source maintainer of the wildly popular npm package colors, published colors@1.4.1 and colors@1.4.44-liberty-2 in which they intentionally introduced an offending commit that adds an infinite loop to the source code. The infinite loop is triggered and executed immediately upon initialization of the package’s source code, and would result in a Denial of Service (DoS) to any Node.js server using it.

Search History

Easily access your search history to quickly find the Egnyte content you’ve looked for previously. Whether your past search took place on the Web UI, desktop, or mobile, Egnyte remembers past queries and search filters. You’ll be able to quickly review old searches, adjust any previously added filters, and track down the content you need. Locate your files and folders effortlessly using Egnyte’s search history!

Endpoint Enigma | Is 2022 the Beginning of the End of On-Prem Security?

Nearly two years after we were forced to experiment with remote work, 2022 will be an inflection point for both threats and cybersecurity solutions. Tune into our annual predictions episode to hear what Lookout CTO of SASE Products Sundaram Lakshmanan thinks will happen next year. We'll be discussing everything from software supply chains to threat hunting and data protection.

Endpoint Enigma | Let's Get Real About Zero Trust: How To Assess Your Security Posture

While most of us understand Zero Trust conceptually, the path to Zero Trust is a complex and constantly evolving journey. In this episode, host Hank Schless is joined by Andy Olpin, Solutions Engineer at Lookout to scale back all the marketing noise surrounding the term and discuss how organizations can pragmatically get started with Zero Trust.

CISO Insider - S3E1 - Radical transparency with Robert Former

In our Season 3 premiere of CISO Insider, Acquia VP of Security and CISO Robert Former discusses working as a cybersecurity leader today. Robert shares how radical transparency has helped him at every step of his career: making the right decisions for his org by accepting the right levels of risk, effectively managing data security and compliance in a Platform as a Service environment, and maintaining the connections necessary to make remote work successful.

PCI DSS Compliance Check List & Best Practices You Should Be Knowing

PCI DSS can be very challenging for businesses to achieve, especially when they have limited resources to get things in place. Moreover, understanding the requirements and implementing measures to meet the 12 PCI DSS requirement is altogether a different challenge. Businesses need to consider many aspects when undergoing an Audit and ensuring it is a success. Achieving PCI DSS Compliance requires establishing, updating, and constantly reviewing policies, procedures, and processes. This in turn ensures securing of sensitive data and IT Infrastructure.

7 Best Security Practices to Protect Against the Main Types of Attacks on Web Applications

As the world becomes more digital and interconnected, futuristic technologies such as IoT, 5G technology, quantum computing, and AI are bringing in limitless opportunities along with a whole range of threats and risks. The result – web application attacks are commonplace today with businesses being affected every day. About Indusface: Indusface is a SaaS company that secures critical Web applications of 2000+ global customers using its award-winning platform that integrates Web application scanner, Web application firewall, CDN, and threat information engine.