Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Escaping the Egregious Eleven - Part One

Helping to define and examine the top perceived cloud security threats of the day, the ‘Egregious Eleven’ is the most recent iteration in an evolving set of summary reports published by the Cloud Security Alliance (CSA). It follows on from the ‘Treacherous Twelve,’ which they defined for us in 2016, and the ‘Notorious Nine,’ which they presented in 2013.

Do Files Matter to your Business?

Do Files Matter? As Chief Customer Officer of Egnyte, I get to meet many of our customers and influencers. This is immensely invigorating for two reasons – it helps me get our POV out to the market in an old school, door to door sort of way but more importantly, keeps me on an arc of continuous learning to shape our approach to the market. While this process has played out well over the last several years I have simply run out of time to meet everyone as Egnyte grows.

Max Aulakh | Interviews |Anupam Srivastava | CISO| State of Ohio |

Ignyte CEO, Max Aulakh interviews Anupam Srivastava, Chief Information Security Officer for the State of Ohio discusses the impacts Ohio counties are making through technology, measures the state is taking to detect and combat security vulnerabilities, and bridging the gap in the talent pool.

5 Social Engineering Attacks to Watch Out For

We all know about the type of attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This breed of malicious actor makes news all the time, prompting us to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of attacker who uses different tactics to skirt our tools and solutions.

Why PAM Should Be a CISO's Top Priority

Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface and prevent, or at least mitigate, the damage arising from external attacks as well as from insider wrongdoing or negligence.

Social Engineering 2.0 - Evasive Spear Phishing and Vendor Email Compromise

When companies are investigating the weak points in their cyber defenses, they must look beyond their IT infrastructure. In most cases, an organization’s biggest security vulnerability does not stem from the machines on its network, but from people on the payroll. And because this is common knowledge to threat actors, social engineering attacks that target employees generally constitute a bigger threat to businesses than cyber campaigns that directly attack computer systems.

Microsoft and Synopsys DevOps Partnership: Build Secure, High-Quality Software Faster | Synopsys

Building secure, high-quality software is more challenging than ever. The bar is set high for organizations to release new features and functions without compromising the quality or security in the applications they deploy. Organizations are rapidly adopting DevOps tools and methodologies to keep up-with the demands of accelerated software delivery. They are also implementing application security testing earlier in their development workflow to develop and deploy quality code.

Lacking Direction to Address your ICS Cybersecurity Issues? Here's What You Can Do

With more and more automation systems and industrial devices being connected to networks, raw data from every device can be transformed into a treasure chest of valuable information. Granted, this data can help to optimize the process, but with connectivity comes new ICS cybersecurity concerns.

NIST's New Framework to Mitigate Privacy Risks

Over the past few years, there has been a massive cultural and legal shift in the way consumers view and secure their personal data online that’s in line with the rise of advanced technologies like artificial intelligence. Concerned by an increasing rate of incidents that range from the 2017 Equifax hack to the scandalous Cambridge Analytica gaming of consumers’ social media data for political purposes, policymakers have begun to strike back on consumers’ behalf.