Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Security Orchestration, Automation, And Response (SOAR) Overview

As per Gartner definition, SOAR is the set of technologies that allow enterprises to collect security threats’ alerts and data from multiple sources, and then perform incident analysis and remediation process by using both human skills and machine power together to help in defining, prioritizing, and driving standardized incident response activities in accordance with a standard workflow.

Balancing Data Security and Accessibility

Keeping pace with change. Out with the old, in with the disruptive. Digital disruption has changed every aspect of business and now more than ever, people are paying close attention to the way businesses approach data security. During the 2018 Egnyte Customer Summit, industry leaders presented compelling insight into how the data landscape is evolving and how businesses are being forced to adapt.

Bots: how worried should we be?

Prove you are a human. If you think about that sentence for too long, you realise it’s actually incredibly complex and can bring about a sense of existential angst. Yet, it’s something that is demanded of us on a near daily basis, sometimes more. It turns out, proving our humanity doesn’t require showing the capacity to love, or even passing Blade Runner’s Voight-Kampff test. Rather, we just need to be able to click on pictures of cars or shop fronts.

Apache Struts Vulnerabilities vs Spring Vulnerabilities

Developers the world over depend on the Apache Struts open source framework to build valuable and powerful applications. This open source component and the Apache Software Foundation that stands behind it have provided organizations with a cost-effective force multiplier that allows their teams to develop faster and more efficiently. A very active project, GitHub shows Apache Struts as having 5,441 commits and 112 releases.

Infrastructure Modernization for Future Efficiency

So what exactly is Infrastructure Modernization? “Infrastructure Modernization” is fast becoming the new buzz-term in business IT, but since it was coined there’s been some questions as to what it really means, why it’s becoming increasingly important, and what can be done to address the challenges it raises.

Announcing: Egnyte for Gmail Integration

If Gmail is your preferred email platform, we’ve got some exciting news for you. A few months ago, we quietly released the first part of our integration with Gmail. The integration enables users to save email attachments to Egnyte without leaving their inbox. It offers a simple way to keep attachments organized, accessible and easy to share with colleagues.

Auditing Amazon Machine Images with Tripwire for DevOps

Tripwire for DevOps continues to add new features and capabilities. The newest of these is the ability to perform vulnerability scans against Amazon Machine Images (AMIs) in the same Tripwire for DevOps workflow used for your Docker containers. This blog will discuss the creation of AMIs and how to audit them for vulnerabilities within Tripwire for DevOps.

What does a compliance consultant do?

Let’s get one thing out there from the get-go. Being a Bulletproof consultant is awesome. I haven’t been coerced to say that. I mean, let’s start with that brand name. How cool is it to say I work for Bulletproof? I have several T-shirts with the logo emblazoned across the chest. Sometimes, I even wear them on a non-work day.