Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

6 Strategies for Cybersecurity Risk Mitigation

This past year saw nearly a 300% increase in reported cybercrimes, according to the FBI’s Internet Crime Complaint Center (IC3). There has been a clear rise in threat volume and sophistication as many cybercriminals shift to techniques that can effectively evade detection and easily go after high-value targets. IoT devices are becoming a focus for threat actors, and threats related to credential harvesting and ransomware are also growing in number.

Top 5 high severity CVEs detected by Detectify since June 2020

We’re going to highlight the Top high severity CVEs found by Detectify. Thanks to the Crowdsource global community of handpicked ethical hackers, Detectify users get continuous access to the latest threat findings “from the streets” – even actively exploited vulnerabilities for which there aren’t yet any official vendor patches or updates.

Empower Your Data Governance

Learn how Egnyte protects your organization’s sensitive content from vulnerabilities that can stifle your productivity, including Insider Threats, Ransomware and Data Breaches. You’ll also find out how Egnyte can help you to maximize your GDPR, CCPA, GxP and HIPAA compliance initiatives. To gain visibility into your sensitive content, sign up for Egnyte’s complimentary Data X-Ray today: pages.egnyte.com/Schedule-Complimentary-Data-X-Ray.html

RBAC and ABAC with AWS IAM

This is a guest blog post from Shuo Yang in his blog series “Transitioning to Programming the Cloud”, as a part of our blog posts focusing on Identity, Security and Access. We talked about how AWS CIP, STS and IAM can serve as the foundation of application authorization in our last post, i.e., how the application gets the temporary credential representing a specific role (i.e.

Critical Data Breach Stats for Australian Businesses in 2021

If you're an Australian business reading this, there's a 30% chance you will suffer a data breach. Such cutthroat statistics, as uncomfortable as they are to read, are important to be aware of if you want to avoid becoming one. To help you achieve a data-driven approach to cybersecurity, we've aggregated some of the most critical data breach stats for Australian businesses. This list also includes global data breach statistics that could be a window into Australia's future modified threat landscape.

Cloud Security Best Practices: Four Tips for Moving Security Technologies to the Cloud

In my previous post, I discussed cloud-computing security challenges identified in our new report, Beyond Cloud Adoption: How to Embrace the Cloud for Security and Business Benefits. Based on a survey conducted by Enterprise Strategy Group (ESG), the report found that while cloud computing does initially introduce security challenges and increased complexity, it’s worth it in the end. That said, CISOs need to strategically invest time and resources to achieve better security outcomes.