Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Lookout partners with Google to deliver Zero Trust and BeyondCorp vision for mobile devices

Productivity suites have changed the way we work With the advent of cloud productivity platforms, tablets and smartphones have become an integral part of our work and personal lives. At any time, we are one tap away from accessing the same content as our desktop computers. In some ways, mobile devices have replaced those traditional devices as our main productivity tool. To borrow a line from a current ad campaign for tablets – “your next computer is not a computer.”

Cloud Content Governance: Egnyte's Data Security Framework

Are our systems secure? Is our valuable content safe? These are tough questions to tackle when news headlines regularly bombard us with messages of cyberattacks and security breaches. Centrify, a zero-trust and privileged access management provider, reported that 71 percent of business decision-makers are concerned that the move to remote working creates a significant increase in the risk of cyberattacks.

Nightfall DLP enables customer-centric data security for one of the largest movie-ticket retailers

Just when a company thinks they’ve seen it all in cybersecurity, new challenges in data protection keep security leaders on their toes. One of the largest movie-ticket retailers discovered a need to protect sensitive data that could be shared across their productivity tools.

Air Gap Distribution Delivers Peace of Mind to Isolated Environments

The best way to stay out of danger is to keep far away from where danger lurks. But in the internet age, the global network means risk to your systems is from everywhere, at all times. With estimates that worldwide damage from cybercrime will exceed 6 trillion dollars by 2021, many companies choose, or are required by regulations to isolate their most sensitive systems to avoid any type of security breach.

What is Your #1 Resource to Keep Your Organization Safe from Cyber Attacks?

It’s not surprising that the #1 resource to keep your organization safe from cyber attacks is….your employees! Your employees are your main line of defense against hackers. Cyber attacks can destroy your business. It’s important to invest in your best line of defense: your employees. Engaging your employees with education while protecting their mobile devices and endpoints could be the most important piece of your security strategy.

Managing Compliance & Security In A Remote World

There are many advantages to having employees working from home, but there also seems to be significant challenges regarding data security, privacy, and compliance. How can we address these issues? Best practices for securing remote devices Maintaining compliance when employees work remotely Addressing additional risks caused by the COVID-19 Pandemic Regaining visibility into your mobile workforce using technology

Shared Responsibility and Configuration Management in the Cloud: SecTor 2020

A number of high-profile data breaches have resulted directly from misconfigured permissions or unpatched vulnerabilities. For instance, the 2017 Equifax breach was the result of exploiting an unpatched flaw in Apache Struts allowing remote code execution. More recently, the Capital One breach last year stemmed from a misconfigured web application firewall. Verizon’s 2020 DBIR reported that only hacking was more prevalent than misconfiguration errors as the culprit of data breaches.

How Long Should You Hang Onto Your Data?

One of the most common questions that businesses operating under GDPR, LGPD or other similar data regulations have is how long should you keep data? As answers to this question typically seem to vary widely to clear up confusion, we’ve gathered insights from business leaders & specialists across a variety of industries to try and answer this question and shed light on what are reasonable timeframes to keep hold of data, whether that may be financial, employee or other potentially sensitive data.