Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Optimising Supply Chain Cyber Security is Critical to the UK Healthcare and Pharmaceutical Sector

The potential impact on the UK healthcare and pharmaceutical industry from cyber-attacks is front-of-mind for a number of key reasons, including how critical these industries are to everyday life. First, the Intellectual Property (IP) at the operational epicentre of these businesses - collectively worth hundreds of billions in R&D investment annually - makes the pharmaceutical industry an increasingly attractive target for cyber threat actors.

The Spy Who Searched Too Much: Insider Threat Lessons from the Rippling-Deel Lawsuit

The recent Rippling-Deel lawsuit is a stark reminder of the devastating impact of insider threats. This high-profile case between two HR tech unicorns reveals how vulnerable even the most innovative companies can be when protecting their trade secrets from within. What could Rippling have done to catch the alleged spy in the first place? We’ll walk you through the case and highlight how an insider threat platform could have detected and prevented the incidents earlier.

Fort Knox for Your Data: How Elasticsearch X-Pack Locks Down Your Cluster - Part 1

Picture this: an always-awake, never-tired, high-speed librarian that instantly finds the exact information you need from a massive collection of books. This extraordinary librarian is also capable of processing millions of requests simultaneously, understands partial or misspelled words, and even predicts what you’re looking for before you finish asking.

Passwords, a necessary evil: Are We Ready for a Passwordless World?

Performance reviews, insurance, root canals, speed bumps, and income taxes are but a few things we might consider life’s “necessary evils.” Let me add another one to the list: passwords! For decades, PINs and passwords have been the backbone of online security, but let’s face it, they’re almost always cumbersome, annoying, and far from perfect.

Understanding and Securing Exposed Ollama Instances

Ollama is an emerging open-source framework designed to run large language models (LLMs) locally. While it provides a flexible and efficient way to serve AI models, improper configurations can introduce serious security risks. Many organizations unknowingly expose Ollama instances to the internet, leaving them vulnerable to unauthorized access, data exfiltration, and adversarial manipulation.

The Cost of False Positives: Why Cybersecurity Accuracy Matters

Cybersecurity is a high-stakes landscape, with very real threats of data breaches, malware, and other cyberattacks lurking around the corner. But detecting cyber threats is only half the battle—what happens when the threats you detect aren’t real? Enter the deceiving world of false positives—security alerts that incorrectly identify legitimate activity as malicious. While most security tools are designed to maximize detection, they often sacrifice accuracy in the process. The result?

Embrace the Future: Egnyte Hybrid Appliances Now Fully Compatible with Nutanix AHV

Organizations that rely on virtual environments often struggle with integrated security, data locality, and scalability. That's why we're excited to announce a powerful new certification—Egnyte Hybrid Appliances (Smart Cache) now support Nutanix Acropolis Hypervisor(AHV) platform. This strategic move enhances our offering, giving businesses an even more robust, efficient, and future-proof virtual environment solution.

Zero-day vulnerabilities: the real threat behind Netflix's "Zero Day"

Imagine a hidden flaw in software that no one—except cybercriminals—knows about. A zero-day vulnerability is exactly that: a security weakness that hasn’t been discovered or patched by developers. Because there’s no fix, attackers can exploit these flaws before anyone has a chance to defend against them.

How to Improve Your Security Posture with the Least Effort Using ASPM

Security posture management has become exponentially more complex for organizations developing and managing a vast ecosystem of applications. Evolving architectures like microservices, hybrid cloud infrastructures, and frequent release cycles introduce constant change and challenges. Amid these growing challenges are the existing security gaps organizations are struggling to address.