Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

WatchGuard Wins Two Fortress Cyber Security Awards

We’re thrilled to share that Business Intelligence Group has named WatchGuard as a winner in the Organizational Excellence category and recognized WatchGuard CEO Prakash Panjwani with a prestigious Leadership Award at this year’s Fortress Cyber Security Awards! This annual program recognizes the top companies, executives, and products from around the world leading the charge in preparing, defending and responding to growing cybersecurity threats.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Prakash Panjwani Named "CEO of the Year" at 2023 Tech Ascension Awards

Today, we are proud to share the exciting news around WatchGuard CEO Prakash Panjwani’s big win at the annual Tech Ascension Leadership Awards – taking home the program’s prestigious “CEO of the Year” title for 2023! The Tech Ascension Awards program recognizes the top technology companies and leaders driving cutting-edge, innovative solutions to solve critical challenges in their respective markets.

Corporate KYC: How to Verify and Onboard Businesses

Corporate KYC, also known as KYC of Company, is the process of screening a business or corporate body and its beneficiary owners for AML/KYC compliance. This blog article will teach you about KYC Requirements for Corporates, the Corporate KYC process, what information a corporate client must submit, and how corporate KYC procedures may be automated using simple technologies.

Device Authority's Certificate Lifecycle Management Platform

In today’s digital landscape, where security breaches and data vulnerabilities are rampant, organizations must be equipped with robust measures to protect their valuable assets. One critical aspect of cybersecurity is managing certificates effectively throughout their lifecycle. But what exactly is Certificate Lifecycle Management? And how can it benefit your business?

The Importance of Centralized Security for Healthcare Providers

As a healthcare administrator, you have an ever-growing list of things to contend with – from increased workplace violence, and the protection of expensive medical equipment and precious medical supplies, to the security of controlled medications, and the safety of a plethora of private and sensitive patient and employee data. Securing a healthcare facility is as complex as it is essential.

What is retargeting and how can you use it?

Retargeting is a powerful advertising technique that allows brands to reach out to potential customers who have previously interacted with their website or mobile app. It works by using cookies to track users' online behaviour and display to them targeted ads on various websites and social media platforms. Read on and find out how you can use retargeting in your business.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Bringing IT & OT Security Together, Part 2: BAS and the Purdue Model

In our first post on using BAS in an operational technology (OT) environment, we provided an overview of a typical converged IT/OT network, the trends that were driving increased cyber risk for industrial asset owners, and a high-level discussion of how BAS can help provide better visibility and protection across the converged environment.