Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Social Engineering Part 1: What is social engineering?

Social Engineering is a form of security fraud that relies on psychological manipulation techniques to trick people into revealing sensitive information. This is often carried out online using a variety of social engineering techniques; one of the more commonly referred to social engineering attacks are phishing attacks (including, vishing, smishing, spear phishing and whale phishing).

25 Years of Security: does history matter?

There’s little in the world of technology that qualifies as sui generis (that is, unique unto itself). What goes around really does come around and there is safety in respecting that. Why look back to then in cybersecurity? Because one of the best ways to understand how to protect your network, Wi-Fi, and endpoints is to familiarize yourself with what led to today’s tortuous threat landscape.

Astra Login Recorder - A Better Way to Secure Websites

Gone are the days when organizations used to run and scale their offline businesses at three-toed sloth’s speed. The inception of the Internet turned into a really pervasive and groundbreaking force in our life, with millions of Websites serving billions of web pages to people on a daily basis. Through various advancements, web and SaaS applications have become intelligent, dynamic and asynchronous.

DMARC and the prevention of World Health Organization phishing scams

In recent years the outbreak and spread of COVID-19 have left many people with fears and questions. With various medical opinions, news outlets spreading varied statistics, case number and death reports, and safety recommendations that varied between countries, states, cities, and individual businesses, people often felt desperate for information.

Webinar: Preventing Privacy and Cybersecurity Breaches

Check out this webinar to gain a deeper understanding of how to prevent privacy and cybersecurity breaches and ensure business continuity in a zero trust world. The webinar is hosted by Natali Adison, Technology, Data Protection & Cybersecurity attorney and Reuben Braham, VP Marketing at Cyberint.

Validating Arctic Wolf's Incredible Voyage

One of my favorite books is “Endurance: Shackleton's Incredible Voyage” by Alfred Lansing. I encourage you to read it if you haven’t. Here is a brief synopsis of the true-to-life story: In August 1914, polar explorer Ernest Shackleton boarded his ship, the Endurance, and set sail for Antarctica, where he planned to cross the last uncharted continent on foot.

First-Party vs Third-Party Cyber Insurance: What's the Difference?

Often it's not a question of if your business will experience a data breach, but when. Hackers are always looking for new ways to take advantage of weak networks or trick employees into falling prey to their schemes. And if your business operates computer systems or handles sensitive data regularly, you are at risk. Having the right insurance coverage to provide aid in the event of a cyber attack can save your business from expensive lawsuits and reputational damage.

Review and Approval Workflows

Easily streamline collaborative procedures and perform document review and approval using Workflows in Egnyte. From the file preview, under the Workflows menu, you can add a one-step task, or a multi-step workflow for each stage of review, including final approval. For GxP domains, approval includes Part 11-compliant digital signatures. Collaborators are automatically notified when the workflow moves to a step they’re assigned to.