Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Egnyte Enables Secure File Sharing and Collaboration for CROs

‍ As a contract research organization (CRO), your greatest responsibility is to be a reliable partner to the sponsor in executing a clinical trial. This can include tasks such as writing the study protocol, collecting and submitting data to the FDA, and monitoring sites throughout the study. To honor that responsibility, a CRO must have the right tools and skills to securely share trial data and collaborate with the sponsor.

Under the Wing: Detecting Fileless Attacks with Advanced Memory Scanning

In 2021, over 60% of all attacks were malware free. Because malware free or fileless attacks can be carried out entirely in memory, detection can be challenging. But with new cutting-edge Advanced Memory Scanning capabilities, organizations can quickly automate high-performance scanning to detect the most advanced attacks.

Netskope IoT Security

Netskope IoT Security uncovers managed and unmanaged connected devices on both the radio and network spectrum and generates deep device-level contextual intelligence for device classification, asset management, dynamic risk assessment, segmentation, and access control, mitigating IoT-related threats and addressing the hidden attack surface created by the connected devices.

The CPRA Clearly Explained (Includes a Compliance Guide)

The California Privacy Rights Act (CPRA) is a privacy law that was passed in California in 2020. It strengthens the security standards of the California Consumer Privacy Act (CCPA), making California's consumer privacy laws more aligned with the General Data Protection Regulation (GDPR). The CCPA gives California residents the right to know what personal data is being collected by companies and whether it will be sold or disclosed to other parties.

CISA Top Malware Summary

This blog summarizes the Splunk Threat Research Team’s (STRT) recent review of the CISA Top 10 Malware strains for the year 2021 report. While many of these payloads have been covered in our past and present research (available at research.splunk.com), these malware families are still active in the wild. Notably, five malware families we analyzed in this article can still be seen in the ANY.RUN Malware Trends Tracker.

How To Do AppSec: The Application Security Guide

Modern applications are sophisticated, with different third-party software and hardware components and complicated integrations compared to legacy applications. With these complications, there is an increase in exploitable vulnerabilities in the application layer. Thus, application security is one of the most critical aspects organizations should focus on to secure their applications from cyberattacks.

How cybersecurity builds a sustainable future

Here's a familiar term: sustainable development. First used in 1987, it has since taken various shapes for a plethora of uses. But right now, sustainability has become the need of the hour—the need to evolve without compromising the survival of future generations. By 2025, an estimated 1.8 billion people on this planet will not have access to drinking water. If we don't change our ways in the next 27 years, experts predict we will run out of food. And at our current rate of consumption, we need around 1.7 planet Earths to sustain us.

Audit Policy: Object Access: SAM

Audit Policy: Object Access: SAM is a setting in the Windows operating system that controls the auditing of security events related to access to the Security Accounts Manager (SAM) database. The SAM database is used to store user account information, including login credentials, on a Windows system. When the setting is enabled, the system will generate an audit event in the security log of the event viewer every time an attempt is made to access the SAM database.