Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

4 Cost-effective Cybersecurity Solutions to Enhance Your Defensive Posture Today

October is Cybersecurity Awareness Month, which means that companies are once again surveying the threat landscape. They can’t like what they see. By July 2021, threat actors attempted more than 304 million ransomware attacks, surpassing the 2020 total just halfway through the year. At the same time, the number of phishing scams is soaring, and the cost of a data breach is more expensive than ever before, reaching $4.24 million, according to the most recent industry study.

The Future Of Cybersecurity | 5 Reasons Cybersecurity Deserves Your Attention Today

Already a significant concern before 2021, this year has revitalized cybersecurity as a top priority for every organization. Highly consequential cybersecurity incidents at companies like Colonial Pipeline, Kaseya, and T-Mobile brought front-page coverage to the issue, while cybersecurity attacks on small and medium-sized businesses soared, spreading the reach of threat actors.

Leveraging National Cybersecurity Awareness Month to Reduce Insider Threats

October is a month that generates much buzz amongst the cybersecurity community. It’s National Cybersecurity Awareness Month (NCSAM) – a time when security professionals work around the clock to raise awareness of growing cyber risks amongst general user communities.

Cybersecurity in Higher Education: Understanding the Threats & Adopting A Zero Trust Approach

While there’s no real way to prevent them all, understanding vulnerabilities, common types of cyberattacks and how to prevent them can help college and university leaders prioritize their security strategies to help keep institutional data and students safe.

What The Worst Attacks Of 2021 Can Teach Us On The Future Of Ransomware

Despite the steady drumbeat of hacks that are reported on a nearly weekly basis, it is safe to say that cybersecurity is still far from a “top of mind issue” for most people. Massive data breaches like Equifax, Marriott, and many, many more are chalked up to being yet another part of the modern life. While each of those cybersecurity incidents was quite serious in its own right, for the public whose data were compromised, they represented more of an inconvenience than a serious concern.

7 Best Practices to Prevent Data Theft by Departing Employees

Departing employees are a source of insider threats that often get overlooked. According to a study by Biscom, one in four departing employees steal data when leaving. Whether they do so out of negligence or with malicious intent, such cases can only have negative outcomes for organizations, from losing their competitive advantage to facing penalties for non-compliance with cybersecurity requirements.

Splunk and DTEX Systems Leverage Human Telemetry and Zero Trust to Mitigate Insider Risks and Account Compromise

What was once the thing of spy movies and industrial espionage news headlines is now, sadly, a common occurrence for public organizations and private enterprises around the globe. Insiders… employees, consultants, partners… have emerged as one of the most immediate and serious threats facing IT and cyber security teams and practitioners today. It is not however because every insider has turned malicious.

Opportunistic Attackers: Who Are They and How Can You Deter Them?

When presented with an opportunity, people who never even planned to attack your organization may turn into a severe cybersecurity threat. Forget to block a dismissed employee from accessing your system and they may steal or alter your critical data. Grant a third-party contractor excessive access to your infrastructure and they may cause a serious data breach. That’s why it’s crucial to make sure you don’t give insiders an opportunity to turn malicious.

How to Use Egnyte to Protect Against Insider Threats

Vigilant companies continuously review risks and their cybersecurity postures. They deploy active defense-in-depth measures and utilize the latest malware detection and mitigation techniques. However, there is one type of vulnerability that tends to fall through the cracks—insider threats. That’s because IT organizations often believe it’s management’s problem to address, while managers believe IT groups have insider threats under control.