Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is an Attack Vector? Common Attack Vectors

In cybersecurity, an attack vector is a path or means by which an attacker can gain unauthorized access to a computer or network to deliver a payload or malicious outcome. Attack vectors allow attackers to exploit system vulnerabilities, install different types of malware and launch cyber attacks. Attack vectors can also be exploited to gain access to sensitive data, personally identifiable information (PII) and other sensitive information that would result in a data breach.

Escaping the Egregious Eleven - Part One

Helping to define and examine the top perceived cloud security threats of the day, the ‘Egregious Eleven’ is the most recent iteration in an evolving set of summary reports published by the Cloud Security Alliance (CSA). It follows on from the ‘Treacherous Twelve,’ which they defined for us in 2016, and the ‘Notorious Nine,’ which they presented in 2013.

Do Files Matter to your Business?

Do Files Matter? As Chief Customer Officer of Egnyte, I get to meet many of our customers and influencers. This is immensely invigorating for two reasons – it helps me get our POV out to the market in an old school, door to door sort of way but more importantly, keeps me on an arc of continuous learning to shape our approach to the market. While this process has played out well over the last several years I have simply run out of time to meet everyone as Egnyte grows.

Max Aulakh | Interviews |Anupam Srivastava | CISO| State of Ohio |

Ignyte CEO, Max Aulakh interviews Anupam Srivastava, Chief Information Security Officer for the State of Ohio discusses the impacts Ohio counties are making through technology, measures the state is taking to detect and combat security vulnerabilities, and bridging the gap in the talent pool.

5 Social Engineering Attacks to Watch Out For

We all know about the type of attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This breed of malicious actor makes news all the time, prompting us to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of attacker who uses different tactics to skirt our tools and solutions.

Why PAM Should Be a CISO's Top Priority

Privileged access management (PAM) consists of strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for users, accounts, processes and systems across an IT environment. By implementing an appropriate level of privileged access controls, PAM helps organizations condense their organization’s attack surface and prevent, or at least mitigate, the damage arising from external attacks as well as from insider wrongdoing or negligence.

Social Engineering 2.0 - Evasive Spear Phishing and Vendor Email Compromise

When companies are investigating the weak points in their cyber defenses, they must look beyond their IT infrastructure. In most cases, an organization’s biggest security vulnerability does not stem from the machines on its network, but from people on the payroll. And because this is common knowledge to threat actors, social engineering attacks that target employees generally constitute a bigger threat to businesses than cyber campaigns that directly attack computer systems.

Microsoft and Synopsys DevOps Partnership: Build Secure, High-Quality Software Faster | Synopsys

Building secure, high-quality software is more challenging than ever. The bar is set high for organizations to release new features and functions without compromising the quality or security in the applications they deploy. Organizations are rapidly adopting DevOps tools and methodologies to keep up-with the demands of accelerated software delivery. They are also implementing application security testing earlier in their development workflow to develop and deploy quality code.

Lacking Direction to Address your ICS Cybersecurity Issues? Here's What You Can Do

With more and more automation systems and industrial devices being connected to networks, raw data from every device can be transformed into a treasure chest of valuable information. Granted, this data can help to optimize the process, but with connectivity comes new ICS cybersecurity concerns.