Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Prevalent vs CyberGRX Comparison

Every day the news is filled with third-party data breaches and data leaks. And for a good reason, they often expose the protected health information and personally identifiable information of thousands or even hundreds of millions of people. For context, the Ponemon Institute estimates that the average cost of a data breach is nearly $4 million globally.

COVID-19 Scam Roundup - April 20, 2020

Scams leveraging coronavirus 2019 (COVID-19) as a lure have stolen tens of millions of dollars from their victims. As of April 16, 2020, the Federal Trade Commission (FTC) had received 20,334 consumer reports of fraud attempts pertaining to the coronavirus since the beginning of the year. Those attacks that proved successful had caused their victims more than $15 million in damages at the time of writing. Unfortunately, both of those figures are likely to grow as time goes on.

Building Effective Cybersecurity Budgets

Building an effective and resilient organization on a budget isn’t a small task. When it comes to cybersecurity budgets, there are many different aspects that need to be considered. Thankfully, alignment with industry best practice and recognized security frameworks adds a small amount of clarity to this challenge.

Egnyte Extends Integration with Microsoft Teams

Egnyte is committed to building an ecosystem of solutions that help organizations collaborate more effectively and securely. Our ongoing work with Microsoft Teams, which already includes Egnyte capabilities through Collaboration Tab and Messaging Extension, is an important part of this goal.

Enable Global DevSecOps with Cloud Enterprise and Xray on AWS

When software can travel around the globe at the speed of the cloud’s gusts, enterprises need to be extra certain the updates they release are safe for customers to use. If an app built in Palo Alto uses a vulnerable package from Belgrade, losses can ripple from Sheboygan to Shanghai. At JFrog, we believe enabling global DevSecOps in the cloud should be an easy process.

5G Technology: How to Make Sure the Benefits Outweigh the Security Risks

It’s hard not to say that 5G technology brings a lot of benefits. 5G entails faster download speeds, and yes, if you have a 5G-enabled handset, you could hear and appreciate the speed increases for videos, gaming, etc. However, 5G provides added benefits that go way above those for the everyday user. Let’s take a look at the high speed and low latency of 5G. There are a lot of areas or industries that require pinpoint accuracy and precision.

5 most common mobile phishing tactics

Phishing is one of the things that keeps CISOs up at night. Phishing attacks are effective and simple to launch, and used by financially motivated attackers as well as more targeted attacks. In the case of a targeted attack, it may harvest login credentials to gain access to corporate or personal resources. In fact, sometimes corporate access can be used to steal personal data, and vice versa.

G2 Names Egnyte Top Remote Tool

As businesses adjust to flexible working arrangements amidst stay-at-home orders and social distancing guidelines during the COVID-19 (coronavirus) pandemic, many are looking to technology to support the needs of remote workers. While many companies were already using software to support working outside of physical offices, tools that enable remote working have now become mission critical in many cases to avert disruption during the unprecedented time we find ourselves in.