Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting Sensitive Data with Egnyte in Today's Threat Environment

In light of recent attacks against on-premises file server appliances affecting organizations of all sizes and industries, it has become clear that, in many cases, companies would be better suited to choosing cloud solutions for their secure data management needs. There are many great products on the market capable of providing easy access to files persisted in your local network.

Cloud Threats Memo: Extracting Training Data from Generative AI Language Models

This year will probably be remembered for the revolution of ChatGPT (the website was visited by 1.7 billion users in October 2023, with 13.73% of growth compared to the previous month) and for the widespread adoption of generative AI technologies in our daily life.

The complete guide to compliance risk management

To build a successful business you’ll need to acquire new customers, save on costs, and avoid major pitfalls that could impact your bottom line. An important aspect of this is managing your organization's compliance risk. These include the risk of penalties, legal judgments, and other issues that could come as a result of not complying with legal regulations and industry standards.

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.

The Winter Wonderland of Cyber Threats

It’s the season for mince pies, tinsel and, of course, holiday shopping. I am in the Middle East so temperatures are quite pleasant for a mall stroll while shopping for family gifts, but it’s certainly odd hearing Mariah Carey being played and seeing fake snow on Christmas trees when it’s 25 degrees outside. While I prefer to do my shopping in person, around the world the majority of festive shopping happens on mobiles and laptops.

Anheuser-Busch Distributor, Ben E. Keith, Network Breach Update

Ben E. Keith Company (BEK) is a food and drink distributor that serves over 62 Texas counties and 15 states. They are a service provider for Anheuser-Busch products, providing everything from craft and import drinks to steaks and sugar. In October, BEK announced a possible data breach of their network information, but further details required an investigation. Their investigations have presumably ended, as a notice for the event has recently appeared on the Texas Attorney General’s website.

Cloudflare 2023 Year in Review

This post is also available in 한국어, 日本語, Português. The 2023 Cloudflare Radar Year in Review is our fourth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

In my previous post, I began to list the ways you can strengthen your security posture, with some holistic approaches to application security and the software supply chain. In this second part of the series, let’s look at six more important considerations.

Regional ISPs Are Narrowing the Digital Divide-But Challenges Remain

Federal and private funding, new market entrants, and creative problem-solving have made it possible to extend broadband connectivity to more U.S. households than ever. But as regional and rural broadband providers, electric utilities and co-ops, satellite operators, and others push to fully close the digital divide, a remaining challenge looms: ensuring enough IP address space to support this growing subscriber base.

Unveiling Our Redesigned Website:

We are thrilled to announce the launch of our new website, a testament to Obrela’s commitment to excellence in the ever-evolving landscape of cybersecurity. As part of this commitment, we have revamped our website to provide you with an enhanced experience, making it easier for you to explore and discover more about our cutting-edge solutions.