Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What can you do with an enriched SBOM? A parlay quickstart guide

We just released parlay, a new open source tool that can enrich SBOMs with additional information. You can read more in the announcement blog post. In that post, we briefly mentioned why this is important for decision-making based on SBOM data, but thought a few quick examples might be interesting. parlay can add a lot of extra information to an SBOM, and we can use that information to write more powerful policies.

Attack Surface Intelligence (ASI) Data Updates: Enhancing Threat Research Capabilities

In the ever-evolving cybersecurity landscape, staying ahead of potential threats is crucial. Attack Surface Intelligence (ASI) is vital in identifying vulnerabilities and mitigating risks. This blog post will discuss the latest data updates in ASI and the exciting developments within our threat research group.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Corporate KYC: How to Verify and Onboard Businesses

Corporate KYC, also known as KYC of Company, is the process of screening a business or corporate body and its beneficiary owners for AML/KYC compliance. This blog article will teach you about KYC Requirements for Corporates, the Corporate KYC process, what information a corporate client must submit, and how corporate KYC procedures may be automated using simple technologies.

Device Authority's Certificate Lifecycle Management Platform

In today’s digital landscape, where security breaches and data vulnerabilities are rampant, organizations must be equipped with robust measures to protect their valuable assets. One critical aspect of cybersecurity is managing certificates effectively throughout their lifecycle. But what exactly is Certificate Lifecycle Management? And how can it benefit your business?

The Importance of Centralized Security for Healthcare Providers

As a healthcare administrator, you have an ever-growing list of things to contend with – from increased workplace violence, and the protection of expensive medical equipment and precious medical supplies, to the security of controlled medications, and the safety of a plethora of private and sensitive patient and employee data. Securing a healthcare facility is as complex as it is essential.

What is retargeting and how can you use it?

Retargeting is a powerful advertising technique that allows brands to reach out to potential customers who have previously interacted with their website or mobile app. It works by using cookies to track users' online behaviour and display to them targeted ads on various websites and social media platforms. Read on and find out how you can use retargeting in your business.

Frequently Asked Questions on the 2023 EU General Court's Pseudonymised Data Ruling

In 2023, the EU General Court overruled the European Data Protection Supervisor and ruled that pseudonymized data will not be classified as personal data under the of EU data protection law when transferred to a recipient who is unable to identify individuals. Businesses are now taking a closer look at their data anonymization processes, as well as the opportunities this new ruling may offer when transferring and accessing data across borders..

Bringing IT & OT Security Together, Part 2: BAS and the Purdue Model

In our first post on using BAS in an operational technology (OT) environment, we provided an overview of a typical converged IT/OT network, the trends that were driving increased cyber risk for industrial asset owners, and a high-level discussion of how BAS can help provide better visibility and protection across the converged environment.