Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Conquering the Taproot of Cybersecurity

What is your organization’s approach to security events? For many organizations, each security alarm is treated with the same urgency as a fire. While a sense of urgency is good, the ensuing panic that occurs is not a recipe for longevity. The constant shifting of attention from one emergency to the next is fatiguing; it can often lead to mistakes that compound an event. The “all hands on deck” approach is similar to an ineffective method of weeding a garden.

September Developer Roll Up

The team at LimaCharlie has been moving some big pieces around the board during the month of September. We have been working on something special. On October 12th we will be running a webinar to demonstrate LimaCharlie’s integration of Red Canary’s Atomic Red Team. Atomic Red Team is a library of tests mapped to the MITRE ATT&CK framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments….

What is advanced persistent threat? Explaining APT security

As the threat landscape evolves faster than we can keep up with, organizations must be aware of the type of threats they may face. Certain threat types, like ransomware and malware, are more prominent and therefore must be fought with the appropriate resources. On the other hand, some threat types are not prevalent and pose significantly less risk. However, just because a specific threat isn’t as widespread does not mean we shouldn’t take it seriously.

Join Snyk in celebrating 31 days of Cybersecurity Awareness Month 2021

Today’s the first day of October as well as the first day of the 18th annual Cybersecurity Awareness Month. The purpose of Cybersecurity Awareness Month is not only to raise awareness about the importance of cybersecurity, but also to inspire people to improve their cybersecurity posture: whether that be through implementing multi-factor authentication, not clicking that suspicious email attachment, or even writing code more securely by utilizing a tool like Snyk. =)

A Simplified Regulatory Checklist for Healthcare Organizations

The healthcare industry is a veritable honeypot for cybercrime, replete with vast amounts of sensitive digital information that expands in number and scope daily, including personal medical data and payment card details. This data is increasingly attractive to hackers, particularly those using ransomware to lock out organizations and hold onto sensitive information until the organization pays up.

Weekly Cyber Security News 01/10/2021

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. At long last, someone is taking fraud seriously enough to provide a phone number at the same level as emergency services. OK, this is only a trial project but it is still encouraging move.

Secure Delivery

Egnyte’s Secure Delivery ensures only intended recipients have access to shared files and allows you to revoke access even if the recipient previously downloaded those files. When customizing a Share link, select Specific Recipients and enter the desired email addresses. Then, under Allow Downloads, choose Yes, Encrypted. Recipients can view the shared file in their web browser, however, they must install Egnyte FileGuard to open the encrypted file.

Recipient Specific Links

Ensure the files and folders you share from Egnyte are only accessible to your intended recipients, by creating recipient specific links. When creating a Share link, under who will have access, select Specific Recipients and enter the email addresses of the desired parties. The recipients will be authenticated via email when they first access the link. If they access the link again in the future, they will be emailed an authorization code to unlock the shared content.

Activating the GDPR Policy

In just a few clicks, Egnyte locates data that is subject to GDPR so you can take proper action to keep it secure and compliant. The EU and UK General Data Protection Regulations affect any businesses that store personal data, which belongs to a resident of the United Kingdom or European Union. In just a few clicks, Egnyte locates data that is subject to GDPR so you can take proper action to keep it secure and compliant.