Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What SASE Got Right and What It Missed: Architecture and Implementation Matters

SASE has transformed how organizations approach secure networking, uniting security and connectivity into a single, cloud-delivered model. As one of the original architects of SASE (along with Neil MacDonald), I was invited at ONUG Dallas to reflect on the state of SASE and what we might have missed in our original research.

Better Prompts for Better Results with Egnyte's Prompt Wizard

Content is core to business operations, and AI is reshaping how teams engage with it. From intelligent summarization and advanced analysis to automated organization, AI streamlines workflows and accelerates decision-making across the enterprise. However, the value of AI-driven capabilities depends on one critical factor: the quality of the input prompt. Well-crafted prompts guide AI to deliver accurate, relevant, and actionable responses.

Mind the Gap: Why UK Cyber Programs Struggle to Turn Visibility into Action

Cybersecurity leaders in the UK are facing a stark reality: managing cyber risk is becoming significantly harder. Not only are threats growing in scale and complexity, but a lack of visibility into digital exposures—both internal and across the supply chain—is compounding the challenge.

New Research: Why 9 in 10 Cybersecurity Leaders Say Their Job Is Harder Today

In today’s environment—marked by accelerating threats like ransomware, increasingly complex supply chains, and the growing footprint of AI and IoT—managing cyber risk has never been more urgent or more difficult. Our latest research with Sapio Research, The State of Cyber Risk and Exposure 2025, draws on the insights of 1,000 cybersecurity and cyber risk leaders around the world to understand what they are focused on today and what will be keeping them up tomorrow.

ClickFix Campaign Targets Restaurant Reservations

BlueVoyant Threat Fusion Cell (TFC) researchers recently investigated a ClickFix attack with unique aspects. The attack began when a user for a UK-based organization navigated to a restaurant’s website for reservations, which they reportedly had used extensively in the past to conduct business meetings and corroborated in the logs.

Are You Protecting the Right People in Your Organization?

If your security priorities still center on CVSS scores and device vulnerabilities, you’re missing a significant piece of the risk puzzle. People. Attackers aren’t following your org chart. They’re targeting whoever gives them access. Enter the concept of Very Attacked People (VAPs): individuals in your environment who attract the most persistent, targeted attacks. And they’re not always the CEO or the CISO.

Business Logic Vulnerabilities Explained: Real Examples, Impact & How to Prevent Them

Imagine an online retailer running a promotion: “Spend $100 this month, get a $25 gift card.” It sounds simple encourage loyal shoppers to spend more. But due to a flaw in the app’s logic, a clever user discovers a loophole. They place enough orders to reach the $100 threshold and receive the gift card. Then, they cancel a small order to drop below the threshold only to make a new one that pushes their total back over $100.

Ransomware As A Service: Understanding the Risks

As companies invest in cybersecurity to avoid fines and ransomware payouts, criminals are doing the opposite by turning ransomware into a full-blown business. With ransomware as a service (RaaS), cybercriminals are building revenue streams by selling ransomware kits online. This model doesn’t require technical skills or deep knowledge of hacking.

Codify to Fortify: The Strategic Advantage of Detection as Code

As a security executive, how do you know if your organization can detect a certain attack? A talented, experienced team armed with advanced tooling can certainly generate confidence — but even then, detections can slip through the cracks if not properly codified.