Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Key Cyber Regulatory Predictions for 2022

Cybersecurity regulations were long viewed as an esoteric afterthought, even as technology exploded into every corner of our lives. But that's no longer the case, as governments and businesses seek to get a better grip on privacy regulations and data protections. At Egnyte, we track legal and regulatory trends closely so we can better serve our customers and respond to changes. Based on those observations, here are our cybersecurity regulation predictions for 2022.

10 Predictions About Cybersecurity Threats in 2022

The number of ransomware attacks continues to grow, and that trend will likely continue in 2022. Organizations will be attacked, files will be encrypted, and victims will need to decide whether to pay ransom or try to implement expensive and painful recovery techniques on their own. That much, unfortunately, should come as no surprise, but what will be different is how those attacks are carried out.

Taking A Unified Approach to Delivering Wi-Fi Connectivity and Security

Nowadays, teleworking or following a hybrid work model has become commonplace. The question we need to ask ourselves is, is our remote connection secure? The National Security Agency (NSA) in the United States has published a best practices info sheet for government workers and contractors working in areas related to national security and defense. info sheet supplies advice on how to avoid cyberattacks due to a compromised or unsecured wireless connection.

FIN7 Tools Resurface in the Field - Splinter or Copycat?

FIN7 is a well-organized criminal group composed of highly-skilled individuals that target financial institutions, hospitality, restaurant, and gambling industries. Until recently, it was known that high-level individuals of this criminal enterprise were arrested — specifically 3 of them — and extradited to the United States. This criminal group performed highly technical malicious campaigns which included effective compromise, exfiltration and fraud using stolen payment cards.

SharePoint and Office 365 compliance & data classification with cp.Discover

Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.

Riscosity Overview

Riscosity Helps Enterprises understand who are their actual Software Vendors. The revenue generating software powering most enterprises, uses 3rd party computer code - called components - sourced from many different companies. Riscosity builds a real time catalog of all these components, and identifies what data is being exchanged with these vendors and helps secure them and reduces any legal liabilities as a result of failed audits or findings.

3 must-dos for IT admins in healthcare organizations to secure patients' data and privacy

Since the beginning of the pandemic, there has been an increase in the volume of sensitive patient data being stored and processed by healthcare organizations. A patient’s health history, including all the treatments, procedures, prescriptions, lab tests, and scan reports, are stored in the form of electronic health records (EHRs).

Monitor Azure Government with Datadog

Azure Government is a dedicated cloud for public sector organizations that want to leverage Azure’s suite of services in their highly regulated environments. As these organizations migrate their applications to Azure Government, they need to ensure that they can maintain visibility into the status and health of their entire infrastructure.

Stories from the SOC - Powershell, Proxyshell, Conti TTPs OH MY!

In the second half of 2021 the AT&T Managed Threat Detection and Response (MTDR) security operations center (SOC) observed an increasing number of attacks against vulnerable Exchange servers. A number of these attacks were attempting to leverage proxyshell vulnerability to gain access to customer’s networks.