Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

CISO Insider - S3E1 - Radical transparency with Robert Former

In our Season 3 premiere of CISO Insider, Acquia VP of Security and CISO Robert Former discusses working as a cybersecurity leader today. Robert shares how radical transparency has helped him at every step of his career: making the right decisions for his org by accepting the right levels of risk, effectively managing data security and compliance in a Platform as a Service environment, and maintaining the connections necessary to make remote work successful.

PCI DSS Compliance Check List & Best Practices You Should Be Knowing

PCI DSS can be very challenging for businesses to achieve, especially when they have limited resources to get things in place. Moreover, understanding the requirements and implementing measures to meet the 12 PCI DSS requirement is altogether a different challenge. Businesses need to consider many aspects when undergoing an Audit and ensuring it is a success. Achieving PCI DSS Compliance requires establishing, updating, and constantly reviewing policies, procedures, and processes. This in turn ensures securing of sensitive data and IT Infrastructure.

7 Best Security Practices to Protect Against the Main Types of Attacks on Web Applications

As the world becomes more digital and interconnected, futuristic technologies such as IoT, 5G technology, quantum computing, and AI are bringing in limitless opportunities along with a whole range of threats and risks. The result – web application attacks are commonplace today with businesses being affected every day. About Indusface: Indusface is a SaaS company that secures critical Web applications of 2000+ global customers using its award-winning platform that integrates Web application scanner, Web application firewall, CDN, and threat information engine.

Riscosity - Securing The Digital Supply Chain - Thought Leaders - Ep. 1

In this episode of Securing the Digital Supply Chain Anirban Banerjee , CEO and co-founder of Riscosity talks to Atif Yusuf and Ravi Gunturi, two well known security leaders in the San Francisco Bay Area. Note - all opinions expressed here belong to the individuals only.

Random but Memorable - Episode 8.6: Games Revival Outtake Special

Is there a better way to ring in the New Year than with the revival of all Random but Memorable's iconic games? What the Phrase, Real or Not Real, Play Your Passwords Right, Three Word Password, Ridiculous Requirements – whichever's your favourite, the gang's all here! Not only that, we've also included some bonus, long-requested outtakes (with the help of a trusty soundboard!) Listen to the chaos unfold as we uncover some lost gems from the show. (Some of which probably should have stayed lost...)

The University of New Orleans: Protecting The Future

Universities are becoming a primary target for ransomware. In 2020 alone, 26 major universities were hit locking valuable research and requiring an average payout of over $450,000. The loss of this type of research and data is colossal. How is the University of New Orleans protecting the future of tomorrow and mitigating threats?

Offline Access on a Mobile Device

The Egnyte Mobile App gives you access to content from your smartphone or tablet. For those times you find yourself without an internet connection, you can still easily get to content you’ve marked for offline access. From the ellipsis menu, simply select Mark Offline to keep a copy of the file locally on your device. Your offline content can be found under the offline tab and where you can easily update your local copies to ensure you have access to the latest versions, and remove them to free up space on your device.