Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Audit Log: Feature Guide for Security and Compliance

In computing, an audit log is a record of an event. An event is any significant action that impacts the hardware or software of a computer – anything from a mouse click to a program error. Besides documenting which resources were accessed and what for, an audit file system will also include the source and destination addresses, the timestamp, and the user ID information.

Query data with greater flexibility using LimaCharlie Query Language (LCQL)

If you’ve been following along our journey, you know that LimaCharlie makes it easy and cost effective to get security data from any source, normalized into a single hub with the unique added benefit of running detection, automation, and response rules at wire speed. On top of being able to store all of your data within LimaCharlie, you get granular control and the ability to send data to any external destination.

6 Tips to select "RIGHT" Digital Risk Protection Vendor

In today's ever-changing digital world, users of digital risk protection solutions encounter various obstacles. Although the top players in the digital risk protection industry provide powerful solutions that come with an array of features and capabilities, customers must still navigate a complicated and fast-moving environment of potential threats.

Why Ransomware is Not Just a Technical or Insider Risk Problem

In this video, we explore why ransomware is not just a technical or insider risk problem, but a larger issue with how we approach technology and economic factors. With multiple parties involved, it is difficult to get a handle on this prevalent issue. However, we discuss what organizations can do preemptively to protect themselves and have a stronger negotiation position against ransomware actors.

Ransomware Sanctions: Exploring the Fallout | Razorwire Podcast

In this podcast episode, Jamie Hayward, Tom Mills, Michael Aguilera and I explore the perplexing irony of the UK government's recent proposal to ban payments to Russian ransomware groups. We debate the ethical, legal and financial implications of such a move and challenge organisations to pre-emptively defend against cyber attacks. "The best way to defeat exfiltration of your data - one of the best ways, there's a few - is using encryption." - Jamie Hayward

Query data with greater flexibility using LimaCharlie Query Language (LCQL)

The team at LimaCharlie is excited to be introducing a new and powerful capability: LimaCharlie Query Language (LCQL). LCQL allows you to query through your data in the LimaCharlie retention more easily and flexibly. It also enables several new useful features.

Reducing the Noise: Why Vulnerability Types Matter

Most application security testing focuses on server-side vulnerabilities. While vulnerability management alerts are necessary within today’s threat landscape for increased security, your teams can quickly become overwhelmed by them. These alerts can create a lot of noise for your development teams, other IT staff, and even your business operations.

February Product Rollup: Search Queries, Smart Upload, and More

‍ Welcome back to another edition of our monthly product rollup! This month, we’re excited to bring you enhancements to search with saved search queries, Smart Upload for Egnyte’s Android app, improvements to Microsoft co-editing on Desktop App and Desktop App Core for Mac, and more.