When two companies merge, there is typically a lot of data that needs to be transferred between the two organizations. This data may include confidential information such as customer records, financial reports, and employee data. If this data falls into the wrong hands, it could be used to commit fraud or theft. That’s where data loss prevention (DLP) comes in.
This month, we’re excited to announce further improvements to public and private links, security and governance issue resolution, content lifecycle management support for content in Microsoft SharePoint and OneDrive, support for viewer-only permissions in the Egnyte mobile app, and more. Check out some of our product releases this month below.
An incident response plan helps protect your business, customers, and finances in the event of a cybersecurity incident, or any kind of business disruption. It’s essential for business recovery and continuity as advanced and unknown cyber threats continue to gain ground. Most companies don’t yet have an incident response plan. Only 19% of UK businesses have a formalized response plan, while just 46% of US businesses have a specific response plan for at least one major type of cyberattack.
Snyk Security Researchers have been using dynamic analysis techniques to unravel the behaviors of obfuscated malicious packages. A recent interesting finding in the Python Package Index (PyPi) attempted to imitate a known open source developer through identity spoofing. Upon further analysis, the team uncovered that the package, raw-tool, was attempting to hide malicious behavior using base64 encoding, reaching out to malicious servers, and executing obfuscated code.
The rapid proliferation of cloud technology has empowered organizations to meet complex challenges with innovative solutions. This flexibility, however, is the antithesis of security — each new cloud solution that an organization adopts expands their attack surface.
We’re thrilled to share that, for the third year in a row, WatchGuard has been recognized in the 2022 TrustRadius Tech Cares Awards! This exclusive awards program honors companies that demonstrate compassion in every aspect of their organization and celebrates the best parts of the tech market and those working in the industry.
You always want to know what is attached to your network. And whether it could be vulnerable or not. In any organisation it’s normal for different devices, on- or off-prem, wired or wireless, to be constantly added or removed – and this can present an opportunity for malicious hackers to take advantage of improperly secured systems. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.