Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

August Release Rollup: AI-Driven Document Summarization and Helpdesk Chatbot for WebUI, Workflow Templates and More

This month's release rollup includes product updates and enhancements from Egnyte around AI-driven document summarization and helpdesk chatbot, workflow templates, and smart cache for Civil 3D. Below is a summary of these and other new releases. Visit the linked articles for more details.

When the largest pure-play cybersecurity company shares your vision: Palo Alto Networks and LimaCharlie

When we put forward a vision for cybersecurity talking about building one platform that covers all security operations - or as we call it SecOps Cloud Platform - we could not have imagined that a month later, the world’s largest pure-play cybersecurity company would buy into this vision. This alignment is flattering, to say the least. Yesterday, Cole Grolmus of Strategy of Security published an article titled The Audacious Future of Palo Alto Networks.

Choosing Security Questionnaire Automation Software (in 2023)

Your security questionnaire workflow is the litmus test for the efficiency of your overall Vendor Risk Management program. If this pipeline gets congested, all of the VRM processes, depending on it, get disrupted, which impacts your security posture and heightens your risk of suffering a third-party data breach.

16 Hospitals Lose Data in Prospect Medical Holdings Breach

Prospect Medical Holdings is an umbrella company with over 16 separate hospitals throughout Pennsylvania, California, Rhode Island, and Connecticut. The company manages a huge amount of information between all those different hospitals, and all that data could easily be misused if the wrong individuals accessed it. Prospect Medical Holdings was recently the victim of a data breach, though the company itself did not announce that information to the world.

What Makes a Strong Password?

A strong password is made up of at least 16 characters and contains upper and lower case letters, numbers and symbols. Strong passwords also follow password best practices so they never contain personal information, dictionary words or phrases, and are never reused across multiple accounts. Continue reading to learn why strong passwords are necessary and tips for creating a strong password.

"Flying Under the Radar:" How to Protect Your Organization's Reputation

Over 72 percent of Indian citizens think their personal data has been compromised, according to a recent article in Business Today. They blame a variety of organizations and institutions, which is understandable. Now imagine your organization is the one to blame. Could your company survive this type of hit to its reputation? Would it be able to retain customers who no longer trust you to keep their sensitive information secure?

Coffee Talk with SURGe: 2023-SEPT-05 Mudge Joins CISA, Qakbot Takedown, Infamous Chisel Malware

Grab a cup of coffee and join Mick Baccio, Ryan Kovar and Audra Streetman for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan competed in a 60 second charity challenge to share their favorite hack of all time before a deep dive on extortionware vs. ransomware.

Becoming FedRAMP and StateRAMP Authorized, Part 2 - Common FedRAMP Mistakes You Can Avoid

August 31, 2023 By Isac Hur, Senior FedRAMP/ StateRAMP/ CMMC Practice Lead and Quality Assurance As a compliance auditor and practitioner in the FedRAMP space, I see a lot of mistakes cloud service providers (CSPs) make that cause them a tremendous amount of grief when seeking authorization. The process is painful enough on its own, but many of the people you hear venting frustration have made missteps.

Cybersecurity Should Not Be Under IT Department

We delve into a critical flaw that continues to persist within many organizations—the subservience of cybersecurity teams to their overarching IT counterparts. Join us as we unpack the challenges stemming from this hierarchy and explore the urgent need for a transformative shift. 🔒 Subordination No More: It's disheartening to witness security teams relegated to a subordinate role within IT departments. The pervasive 'can we' versus 'should we' dilemma underscores a bigger issue that hampers our collective progress.