Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Anheuser-Busch Distributor, Ben E. Keith, Network Breach Update

Ben E. Keith Company (BEK) is a food and drink distributor that serves over 62 Texas counties and 15 states. They are a service provider for Anheuser-Busch products, providing everything from craft and import drinks to steaks and sugar. In October, BEK announced a possible data breach of their network information, but further details required an investigation. Their investigations have presumably ended, as a notice for the event has recently appeared on the Texas Attorney General’s website.

Cloudflare 2023 Year in Review

This post is also available in 한국어, 日本語, Português. The 2023 Cloudflare Radar Year in Review is our fourth annual review of Internet trends and patterns observed throughout the year at both a global and country/region level across a variety of metrics. Below, we present a summary of key findings, and then explore them in more detail in subsequent sections.

Six More Top Tips For Holistic AppSec and Software Supply Chain Security

In my previous post, I began to list the ways you can strengthen your security posture, with some holistic approaches to application security and the software supply chain. In this second part of the series, let’s look at six more important considerations.

Regional ISPs Are Narrowing the Digital Divide-But Challenges Remain

Federal and private funding, new market entrants, and creative problem-solving have made it possible to extend broadband connectivity to more U.S. households than ever. But as regional and rural broadband providers, electric utilities and co-ops, satellite operators, and others push to fully close the digital divide, a remaining challenge looms: ensuring enough IP address space to support this growing subscriber base.

Unveiling Our Redesigned Website:

We are thrilled to announce the launch of our new website, a testament to Obrela’s commitment to excellence in the ever-evolving landscape of cybersecurity. As part of this commitment, we have revamped our website to provide you with an enhanced experience, making it easier for you to explore and discover more about our cutting-edge solutions.

The challenges of keeping open source up-to-date

Open source software has become an integral part of modern application development, enabling developers to accelerate their projects by leveraging pre-existing libraries and frameworks. Open source offers numerous benefits, yet it's not without its challenges. A significant hurdle is ensuring that dependencies remain up-to-date. In our latest blog post, we delve into the complexities associated with updating open source components.

The Future of Call Center Solutions: Embracing Cloud-Based Innovations

In customer service, call centers play a crucial role. Call centers serve as vital intermediaries between businesses and customers. Traditional call center methods are being transformed by innovative cloud-based solutions. This transition leads to smoother, faster operations and easier scalability. Looking to the future, we are excited about how these cloud-based changes will make customer service more personal and friendly.

Simplify Document Authentication and Approval With Egnyte's eSignature

In the realm of document signing and approval procedures, businesses often encounter numerous challenges. Document processing is time-consuming and tedious, with multiple people having to review, print, sign, and scan documents. This manual process is not only inefficient but can lead to documents being lost or misplaced during transit. Additionally, this cumbersome procedure results in expensive delays that have the potential to disrupt business operations.

What is Data Governance?

As the importance of data continues to grow, and the amount of data being processed by organizations grows further, many organizations are beginning to feel the constraints and demands of compliance. Therefore this makes data governance paramount to guarantee the security, accuracy, availability, and usability of your data. Data governance encapsulates the approach to managing data during its lifecycle, from acquisition, to use, to disposal.