Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protegrity Helps AWS Customers Attain Compliance for Data Security

A large solutions and services company facing strict compliance regulations and enforcements needed a powerful, scalable enterprise data protection solution for their data being migrated over to S3, Athena, Amazon Redshift, and Glue environments. The sensitive data included HR, Financial and customer information. Using Protegrity’s field-level data protection, the company overcame this challenge, significantly improving their processes.

Enhancing Data Security in the Wake of Recent High-Profile Breaches

Recent high-profile breaches at Ticketmaster and Santander, attributed to the ShinyHunters group, have brought the critical need for robust data protection measures to the forefront. ShinyHunters, a notorious cybercriminal group known for stealing data from various organizations for financial gain, has demonstrated how vulnerabilities in third-party platforms can lead to significant data breaches.

CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code

CLEARFAKE is the term used to describe the malicious in-browser JavaScript framework deployed on compromised webpages as part of drive-by compromise campaigns to deliver information stealers. It has the potential to impact all sectors. Although the CLEARFAKE fake browser update campaign (which was initially identified in Q2 2023) originally targeted Windows users, it expanded to macOS users in Q4 2023.

How to Create a Vendor Risk Management Process

Modern business operations have become synonymous with outsourcing to vendors, as essentially every business relies on at least a few third-party partnerships to improve efficiency and enhance capabilities. However, these partnerships also present various cybersecurity risks that can negatively impact an organization’s performance, reputation, and compliance with industry regulations and standards. To mitigate these risks, organizations must develop a robust Vendor Risk Management (VRM) process.

GDPR: Penalties for Noncompliance and How to Avoid Them

The General Data Protection Regulation (GDPR) is one of the world's most stringent data protection laws, designed to safeguard individuals' personal data in Europe. Since its implementation in May 2018, GDPR has significantly impacted how organizations collect, store, and process personal data. Noncompliance with GDPR can lead to severe penalties, including hefty fines and reputational damage, making it imperative for organizations to understand and adhere to its requirements.

How to Prepare for Cyber Essentials Assessment

In today's world, where cyber threats are increasingly sophisticated, organizations must take strong security measures to protect sensitive data and maintain operational integrity. One effective way to show your dedication to cybersecurity is by obtaining Cyber Essentials certification. This government-backed scheme in the UK helps organizations implement essential security controls to defend against common online threats.

Egnyte Now Available On Google Cloud Marketplace

In a world where collaboration and efficiency are at the forefront, Egnyte’s partnership with Google Cloud is transforming the way work happens for businesses. We know that many of our customers are also Google Cloud and Workspace customers and that one can simplify procurement cycles and maximize technology investments through Google Cloud. That’s why, starting today, Egnyte is available on Google Cloud Marketplace! Let us break down how this all works.

If I Click a Link, Will I Get Hacked?

If you click on a malicious link, also known as a phishing link, there is a possibility that you’ll get hacked. This is because clicking on a phishing link could immediately cause malware to download on your device. Alternatively, clicking on a link can direct you to a dangerous phishing website where you’re prompted to enter your personal information. Continue reading to learn more about how clicking a link can lead to getting hacked and how to avoid clicking on these malicious links.

How To Set up Passkeys on Amazon and Why You Should

Passkeys are a type of passwordless authentication method that enables you to log in to your accounts without having to enter a password. Instead, you authenticate the same way you sign in to your device such as using a passcode, your biometrics or a swipe pattern. Many websites and apps have started to support the use of passkeys including Amazon. Here’s how you can set up a passkey to seamlessly sign in to your Amazon account.