Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vendor-CISO Dynamics: Building Solutions Through Understanding

Explore the critical relationship between vendors and CISOs with Robert Black. He discusses the need for vendors to understand and address the specific problems faced by organisations rather than just selling solutions. This clip highlights how shifting power back to CISOs can lead to more effective cybersecurity strategies.

How to Create a GDPR-Compliant Password Policy?

If your company has ever worked with businesses in European Union countries, you probably had to follow the EU’s General Data Protection Regulation (GDPR). This rule, which started on May 25, 2018, gives customers more control over their data and makes data collection and use more transparent. A big part of the GDPR is protecting people’s privacy and data from unauthorized access. To do this, companies need a strong password policy.

Security Testing in Software Development: Assessing Vulnerabilities and Weaknesses

The critical role of security testing within software development cannot be overstated. From protecting personal information to ensuring that critical infrastructure remains unbreachable, security testing serves as the sentry against a multitude of cyber threats.

Web Application Security Testing: Struggles, Shortfalls and Solutions

High-value data, mission criticality, and sheer numbers make web applications a compelling target for cyberattacks. According to Verizon’s 2023 Data Breach Investigations Report, web applications were the most commonly exploited vector in both incidents and breaches last year.1 There’s another reason why web applications may be so attractive to threat actors. Most security teams simply cannot keep pace with demands for application updates and patching, testing, and vulnerability remediation.

Unlocking Efficiency: Automate Your Egnyte Workflows with Microsoft Power Automate

The contemporary business landscape is progressively evolving into a realm of intricate complexity. Organizations employ an assortment of systems and tools to streamline processes, amplify productivity, optimize workflows, and abide by the constantly shifting industry norms and rigorous compliance benchmarks - all the while keeping an eye on cost efficiency. Achieving this can be a daunting task.

Understanding Vulnerability Management and Patch Management

Vulnerability management and patch management are often confused. However, it's crucial to recognize that, while complementary, they are distinct processes. Understanding the differences between vulnerability management and patch management is essential for a solid security posture. Let's delve into the concepts to understand better what they are, how they differ, and how they work together.

How Can FIM Protect Against Insider Threats

An insider threat is someone inside an organization – including current and former employees, partners, and contractors – who, intentionally or otherwise, put their organization at risk. They typically abuse their access to private information and privileged accounts to steal or sabotage sensitive data, often for financial gain or even revenge. Organizations today must have effective security solutions in place to identify and respond to insider threats.

SIM swapping, an ongoing threat

Although SIM swap scams or SIM swapping have been around for a number of years, it’s hard to pinpoint exactly when they first appeared. An ENISA report states that as early as April 2016, the British media reported an incident of bank account theft using this technique. In the United States, the first documented case of large-scale SIM swapping was the Joel Ortiz case in 2018.