The Continuing Risk of Remote Code Execution

In 2025, there were more than 48,000 vulnerabilities published, amounting to over a 20% increase from 2024. More troubling than the sheer volume of vulnerabilities in 2025 is that more than a third of them were given a rating of “high” or “critical” severity. For security teams already stretched too thin, a proactive vulnerability management plan that patches or otherwise remediates all vulnerabilities is too far out of reach.

GDPR and Data Retention

Rate this post Last Updated on January 16, 2026 by Narendra Sahoo GDPR and data retention — is an important aspect of organizations operating with large data processing requirements for their customers and third parties. One key area that organizations face challenges is how their data storage and handling should apply to customers: specifically, how long you’re allowed to store customer data, and why this is one of the areas where organizations get it wrong most often.

HIPAA Breach Notification Rule: Meeting the 60-Day Timeline for Website PHI Exposure

Earlier, the anatomy of a HIPAA breach felt tangible. The threat landscape was shaped by risks you could point to, such as physical theft, phishing, or simple human error. Now, some of the biggest risks live in your website and run quietly in the background. Third-party scripts, tracking pixels, and analytics tags can collect or transmit PHI to external parties while looking like routine marketing infrastructure.

Managed Bot Protection for Insurance: Defending Applications from Malicious Automation

According to State of Application Security Report 2025, automated bot attacks surged by 147% year-over-year. This growth highlights a fundamental shift in the threat landscape, where attackers increasingly rely on intelligent automation rather than manual exploitation. For insurance platforms, the impact is direct and measurable. Bot traffic targets logins, agent dashboards, quote engines, claims, and APIs, where even low-volume automation can drive fraud, data exposure, and backend strain.

Simplify log collection and aggregation for MSSPs with Datadog Observability Pipelines

Managed security service providers (MSSPs) deliver 24/7 monitoring and incident response for hundreds of customers across large, hybrid environments. As they add more customers and ingest more logs, MSSPs face mounting difficulties in collecting and processing that data before routing it to downstream security tools. Doing this reliably at petabyte scale while accounting for complex, customer-specific taxonomy and compliance requirements is a major challenge.

CodeBreach: Critical AWS CodeBuild Misconfiguration Enabling Supply Chain Repository Takeover

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed attackers to gain complete control over GitHub repositories used in AWS CI/CD pipelines, including the widely used AWS JavaScript SDK, introducing a severe software supply chain risk. This vulnerability, codenamed CodeBreach, stemmed from insufficiently restrictive CI pipeline configurations, build triggers, and webhook filters.

Configuration Drift: Why 99% of Cloud Failures Are Customer-Caused

"Gartner estimates that 99% of cloud security failures through 2025 will be the customer's fault, primarily due to misconfigurations." Don’t become part of the statistic. Take our configuration drift product tour for a spin. Consider it some light work before the weekend. Most breaches don’t stem from cloud provider failures, but from customer-side issues like misconfigurations, weak identity controls, and unmanaged change.

Five things successful IT teams get right about SaaS management

It’s easy to see how SaaS sprawl happens if you picture the moment it starts. A team is blocked, someone needs a tool ASAP, and the answer to their problems lies just behind a free trial, so they sign up for a new tool. No one is being careless. They’re being efficient. The problem is that follow-up rarely keeps pace with new sign-ups, especially when the card on file belongs to "the company" and the requester has already moved on to the next priority.

Egnyte Joins Anthropic to Bring Secure, Responsible AI to Financial Services

Egnyte is proud to partner with Anthropic in the next phase of Claude for Financial Services—making it easier than ever for sales, investment, and compliance teams to bring their content, context, and institutional knowledge directly to Claude with governed, secure access. As financial institutions race to unlock insights from decades of documents, models, and market data, the challenge has never been simply access.