Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection Act | 8 Principles under GDPR

This video will discuss the 8 principles of data protection act. These are the basic guidelines for any organization that handles personal data, and they're meant to protect your privacy rights. Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Security Risk Management for Insolvency, Restructuring and Bankruptcy Firms

Nick Doyle talks about the security challenges that can impact law firms and advisory organizations that are providing professional services to companies going through insolvency, restructuring and bankruptcy, and how Kroll can help organizations and stakeholders manage the potential risks.

Remotely Removing a Device

Imagine one of your users has their company device stolen. Don’t panic. Egnyte allows you to manage user devices by remotely removing any Egnyte content synced for offline access. Simply navigate to Settings, then Devices. Select the device of your choice, then Remote Wipe to delete all of the Egnyte content synced locally to the device. You can even go a step further to prevent any unwanted access to Egnyte and forcing a logout by selecting Remove Device.

Teleport and PagerDuty Integration

Teleport provides secure access for cloud applications and infrastructure that doesn’t get in the way. When implementing strict zero-trust rules you sometimes need to escalate and elevate privileges. By leveraging PagerDuty, you are able to alert the request and approve or deny system access. Using PagerDuty’s schedule feature, you are able to dynamically assign administrative privileges based on who’s on call. This greatly reduces the scope of access.