Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Egnyte CMMC Compliance Overview

Cybersecurity Maturity Model Certification (CMMC) is a certification program that’s required for all U.S. Department of Defense (DoD) contractors to ensure they have the necessary controls to protect sensitive information. CMMC is anticipated to appear in DoD contracts as early as mid-2025. Egnyte provides an EgnyteGov secure data enclave to help manage CUI and FCI and to help you achieve compliance. Sign up for our CMMC consultation to learn how Egnyte can help with your CMMC compliance journey, so you can continue bidding on DoD contracts.

GitLab's CISO Josh Lemos on the pros and cons of making security practices public

In this week’s episode of The Future of Security Operations podcast, Thomas is joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab with a relentless focus on offensive security, identity management, and automation.

A masterclass in PAM implementation: Key factors and common pitfalls | Webinar

Over the last couple of decades, ManageEngine has successfully implemented PAM across various industries and helped organizations of all sizes secure their privileged access while improving operational efficiency. This webinar will help you learn real-world insights, key factors, and common pitfalls to keep in mind when implementing privileged access management solutions.

GitLab's CISO Josh Lemos on the pros and cons of making security practices public

In this week’s episode of The Future of Security Operations podcast, I'm joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab with a relentless focus on offensive security, identity management, and automation. Josh and I discuss.

The Growing Threat of Ransomware to the Manufacturing Sector

Ransomware has evolved from a distant “I hope it doesn’t happen to us” threat to an insidious, worldwide crisis. Among the sectors most affected is manufacturing, which has found itself more and more in attackers’ crosshairs. Manufacturing has long viewed itself as immune to digital crime, but ransomware attackers have belied this belief.

Cloud your way: Expanding threat visibility to meet the unique needs of your business

Let’s face it: The cloud has become the go-to platform for modern infrastructure—and for good reason. Scalability, flexibility, and speed are hard to beat. But as organizations increasingly rely on the cloud to run their critical operations, the threat landscape is evolving just as fast. And attackers? They’re getting smarter, stealthier, and more cloud-savvy by the day. That’s why monitoring cloud network traffic is no longer optional—it’s essential.