Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SFTP: a More Secure Successor to SCP

Copying files between computers is a common task, and there are a lot of protocols designed to do just that. But not all protocols are created equally. Many people use the popular OpenSSH scp command to transfer files, but few understand the risks surrounding it. This blog post will attempt to explain what the SCP and SFTP protocols are, how they work, and why SFTP should be used wherever possible.

The Future of Connected, Autonomous, Shared, and Electric (CASE) Vehicles is Upon Us.

The popularity of electric vehicles is partly a response to the desire of achieving sustainability and carbon footprint reduction. Automobile manufacturers are making substantial investments to tackle emissions issues, create environment-friendly vehicles, and align with Environmental, Social, and Governance (ESG) requirements. To achieve brand edge and investment appeal, automakers market ESG as a business strategy.

Keeper Demo for Teams and Small Business

Keeper eliminates the pain of having to remember passwords while protecting your business from password-related data breaches and cyberthreats. This video will demonstrate all that Keeper has to offer your small business and provide you with step-by-step instructions to get your team up and running in no time. If you're looking for an Enterprise demo with SSO and advanced capabilities, make sure to check out Keeper Enterprise.

Password Resolutions for 2023

If you’re tired of making the usual New Year’s resolutions to lose weight or save money, we have one you can do from your couch that will still have a positive impact on your life. In 2023, resolve to get a handle on your passwords, whether that’s pledging to create stronger passwords, implementing multi-factor authentication (MFA), or changing compromised credentials. 2022 was another record year for cyberattacks that impacted people’s wallets and peace of mind.

Making Ransomware Recovery a Surefire Thing

Hard question: How do you recover from ransomware? Harder question: How can you prove you can recover? These two questions led our recent Winter Release event, where we discussed how to take the uncertainty out of ransomware recovery and prove that your recovery plan actually works. Read on to see how you can get peace of mind out of your ransomware recovery plan.

December Product Rollup: Watermarking, AutoCAD, and Migration App

‍ 2022 is coming to a close, and we’re excited to bring you one last round of improvements to the Egnyte platform just in time for the beginning of a new year. This month, we’ve got updates to watermarking for viewer-only permissions, UX improvements across the platform, AutoCAD DWG file preview for the Egnyte Android app, and various enhancements to our Migration App. Read all about it below.

Why Do You Need an EV Code Signing Certificate?

You probably know what a code signing certificate is and why it is needed. But for the uninitiated, a code signing certificate is a digital security certificate used by software developers to sign their apps, drivers, software, executable codes, and others. It provides end-users the surety that the software code they received hasn’t been altered or compromised. A Certificate Authority (CA) will provide you with a code signing certificate after conducting the required validation.