Start Your Engines with Egnyte's Data Governance Test Drive
Egnyte recently launched its free, interactive Data Governance Test Drive, which lets you experience the platform for yourself. Test Drive spotlights key capabilities of Egnyte,.
Egnyte recently launched its free, interactive Data Governance Test Drive, which lets you experience the platform for yourself. Test Drive spotlights key capabilities of Egnyte,.
2021 has been a whirlwind of a year for most, with lockdown restrictions easing, businesses re-opening, and people finally being able to see their family and friends in person again. For Netacea, 2021 has been all about strengthening our remote-first team and finally venturing back into the office to meet new and old colleagues face to face once again.
Cybercriminals are increasingly using malicious domains as an attack vector. Our Internet Security Report Q1 2021 already detected a 281% increase in the number of domains blocked by DNSWatch over the previous quarter, and there has been significant activity in the past year with such links exploiting the interest in COVID-19.
In our recent webinar, Log4j Log4Shell Vulnerability Explained: All You Need To Know, our Senior Director Security Research expert Shachar Menashe shared information on the security issue and how to detect and remediate it. We are happy to share additional information in the following Q&A, based on the questions raised during the webinar.
Just when the Microsoft Exchange exploit CVE-2021-26855 thought it would win the “Exploit of the year” award, it got unseated by the – still evolving – Log4J exploit just weeks before the end of the year! Had somebody asked Sysadmins in November what Log4J was then I suspect that the majority would have had no idea. It seems that the biggest challenge the Log4J exploit poses for Sysadmins is simply the fact that nobody knows all the places where Log4J is being used.
Cyberattacks are constantly evolving as criminals discover new ways to crack strong networks or automate attacks to target vulnerable systems. Nowadays, it seems as if cyberattacks are everywhere you look. In 2021, we faced many new attack vectors as the shift to remote work challenged traditional work operations, and we are likely to see those continue well into 2022.