In a previous blog post, I discussed the different applications of integrity for Zero Trust and provided four use cases highlighting integrity in action. The reality is that many organizations can’t realize any of this on their own. But they don’t need to. They can work with a company like Tripwire as a partner on their Zero Trust journey. Let’s explore how they can do this below.
It’s that time of year that the usual happens. Christmas crackers with bad jokes. Holiday specials on TV (constantly). And cyber specialists like me make predictions about the year to come. With the help of insights from Gartner and my own views on what we are likely to see in 2022, I think I can help you with a couple of these. Firstly, it’s worth knowing that Gartner’s predictions come from Gartner IT Symposium/Xpo Americas, which ran virtually in October 2021.
Ransomware is on the rise and shows no signs of slowing. In the past year alone, major ransomware attacks have hit just about every major industry, including health care, physical infrastructure, digital infrastructure, and food. It’s no longer a matter of if, but when an organization will be attacked, which is why most companies now spend considerable resources to defend against ransomware attacks.
Egnyte recently launched its free, interactive Data Governance Test Drive, which lets you experience the platform for yourself. Test Drive spotlights key capabilities of Egnyte,.
2021 has been a whirlwind of a year for most, with lockdown restrictions easing, businesses re-opening, and people finally being able to see their family and friends in person again. For Netacea, 2021 has been all about strengthening our remote-first team and finally venturing back into the office to meet new and old colleagues face to face once again.
Cybercriminals are increasingly using malicious domains as an attack vector. Our Internet Security Report Q1 2021 already detected a 281% increase in the number of domains blocked by DNSWatch over the previous quarter, and there has been significant activity in the past year with such links exploiting the interest in COVID-19.
In our recent webinar, Log4j Log4Shell Vulnerability Explained: All You Need To Know, our Senior Director Security Research expert Shachar Menashe shared information on the security issue and how to detect and remediate it. We are happy to share additional information in the following Q&A, based on the questions raised during the webinar.