Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Management for Architecture, Engineering and Construction

The architecture, engineering, and construction (AEC) industry utilizes Egnyte to help streamline data management and enhance collaboration across projects. With Egnyte, the AEC industry can centralize large project files and drawings and give their teams quick and easy access to their files no matter if they are in the office or on the job.

Spotlight on Technology: Mastering Attack Surface Management with Censys

In our latest episode, join me, James Rees, for a chat with Nick Palmer from Censys about the critical importance of attack surface management. With 25 years of experience in the industry, Nick explains how today's threat landscape has evolved dramatically, with attackers now discovering vulnerabilities within hours rather than weeks. We explore the challenges of maintaining visibility across expanding digital footprints, particularly with cloud adoption creating new blind spots for security teams.

AS-REP Roasting Attack Explained | Real-Life Active Directory Exploit Demo

What is AS-REP Roasting? AS-REP Roasting is an attack that exploits misconfigured Active Directory accounts with disabled Kerberos pre-authentication. Attackers can retrieve password hashes and crack them with minimal effort, leading to unauthorized access. Watch This Real-World Attack Demo Jon Obst, Director of Research at Netwrix, demonstrates: How to Prevent AS-REP Roasting Protect your organization with proactive security controls.

UNC Path Hardening Quick Knowledge Guide

UNC paths allow Windows systems to access shared network resources, but they can also be a target for cyberattacks if not properly secured. In this video, we break down the Hardened UNC Path policy—a crucial security feature that enforces mutual authentication and integrity checks on critical shares like NETLOGON and SYSVOL. You'll learn: How the Hardened UNC Path policy works Step-by-step setup using Group Policy and registry keys How SMB encryption can add extra security (and its compatibility risks)

10 Insider Threat Indicators & How to Prevent Them

Insider threats are rising, and most organizations aren’t ready to stop them. 76% of companies have seen an increase in insider threats over the past five years, but fewer than 30% feel equipped to handle them. These threats don’t trigger alarms like external attacks—they unfold quietly, often going undetected until it’s too late.