Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Preqin Moves to Secure Cloud File Sharing with Egnyte

London-based Preqin is an industry leading alternative asset research firm. With a dispersed global workforce, Preqin struggled with data access challenges from their aging local file servers. In this video, learn how Preqin leveraged Egnyte to support its new cloud-first strategy. Access from anywhere, backup and restore capabilities, secure file access and auditing were key reasons that Egnyte was selected. The company can now respond easily to Subject Access Requests (SARs) thanks to automated PII detection. Operational overhead for managing servers and manual backups and restores are a thing of the past, resulting in tremendous time savings.

Webinar: How an insecure mobile app can tarnish your company's reputation

About The Webinar: Today’s cybersecurity threat landscape is highly challenging. Attackers are constantly on the lookout to exploit security vulnerabilities in applications and systems to gain access to or control sensitive information and launch cyberattacks such as ransomware. With companies spreading sensitive data across different platforms, software as a service (SaaS) platforms, containers, service providers, and even various cloud platforms, it’s essential that they begin to take a more proactive approach to security.

How Hospital Hacks Happen 1: The Unmanaged IOT

"How Hospital Hacks Happen" is the first in a series of videos that aims to raise awareness and education regarding both how hospitals can be attacked and how they can better protect their patients, medical devices and systems. The videos showcase various attack vectors and actors. In this one we look at unmanaged Internet of Things (IoT) devices.

Why We Collect ~70B Security Issues/Week

At SecurityScorecard, we're collecting close to 70 billion security issues per week. Here's how: Worldwide data collection Our goal is to non-intrusively pick up enough data signals from every company worldwide to form an opinion on their cyber hygiene and vulnerability. Malware Sinkholing Working with law enforcement, our R&D team is Our security analysts are looking at the underground criminal communication for poor patching cadence and hygiene indicators.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.