Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity Budgets Increasing, But Internal Challenges Remain - State of Incident Response 2021

We surveyed 400 information security and 100 legal and compliance leaders from companies with over $500M in annual revenue and more than half reported increased cybersecurity budgets for next year and that their executive leadership is more aware of cyber threats. However, over 40% report internal obstacles with the adoption of security processes, lack of organization-wide support, and a "bare minimum" approach to security.

The Role of Managed Detection and Response - State of Incident Response 2021

Internal security teams are overwhelmed by cyber threats and finding seasoned incident response professionals is now harder and more expensive. The State of Incident Response 2021 surveyed 400 information security and 100 legal and compliance leaders from companies with over $500M in annual revenue to learn how managed detection and response vendors are incorporated into their security programs. Over 76% of organizations are relying on a third-party vendor to augment in-house capabilities, and their biggest benefit is delivering faster containment, response, and more automation capabilities.

Microsoft Power Apps Data Leak // Webinar

Learn about the Microsoft PowerApps data leaks that affected over 47 businesses across the globe. In our latest published research, UpGuard analysts discuss a systemic problem with the Microsoft PowerApps product that led to 38 million records becoming exposed through data leaks. The types of data included personal information used for COVID-19 contact tracing, COVID-19 vaccination appointments, social security numbers for job applicants, employee IDs, and millions of names and email addresses.

How to increase & justify your cybersecurity budget

Cybersecurity is a business issue, not just a technology issue, and it is no longer deemed as a luxurious investment but rather a necessary one. It’s been a long time coming, but companies are finally coming to terms with the seriousness of cyber threats. Cyber attacks are growing in complexity, and their unpredictable nature stimulated by the evolution of technology has prompted companies to significantly boost their cybersecurity budget.

Microsoft Office Document Triggering New Zero-Day

Most ransomware groups operating in the RaaS (Ransomware-as-a-Service) model have an internal code of A new zero-day vulnerability (CVE-2021-40444) affecting multiple versions of Windows has recently been discovered and disclosed by Microsoft. According to Microsoft’s Security Update Guide, the MSHTML component can be exploited by an attacker through a custom ActiveX control, allowing remote code execution.

Where Should We Draw the Cyber Blue Line?

What are the limits of online privacy and law enforcement? Can we clearly define them, or is this a vague and blurred area of debate? The fact is that as technology advances, the real and the virtual worlds are increasingly converging. Actions (or inactions) in the cyberspace introduce risks and threats for people, especially the most vulnerable ones, i.e. children and elders.

Collaborate Seamlessly with Egnyte and Google Workspace

Today’s organizations utilize a multitude of solutions to create, share and manage their sensitive content. That business reality is exacerbated by additional cloud file storage solutions that result from acquisitions, competing employee preferences, or shadow IT initiatives. So, it’s no surprise IT teams struggle to manage and control document and file system sprawl.