Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

NAKIVO Launches v11 with Powerful Cybersecurity Features and Advanced Support for Proxmox VE, Microsoft 365, and NAS

NAKIVO Inc., a global leader in data backup and recovery, is excited to announce the launch of NAKIVO Backup & Replication v11, the newest version of its award-winning solution designed to meet the expanding needs of today's virtual and cloud-based environments. This release includes advanced data protection capabilities for Proxmox VE, Microsoft 365, and NAS while introducing key cybersecurity and compliance enhancements.

ISO 27001 Audit Checklist: What Can You Expect?

The full process for achieving ISO 27001 compliance is lengthy, expensive, and difficult. While you can take many steps to make it easier, faster, or cheaper, there’s only so much you can sidestep the ground-level legwork that needs to be done to succeed. Fortunately, we can help you smooth out the process. A few weeks ago, we published a checklist for the full process to achieve ISO 27001 certification.

Fighting Ransomware: Using DLP Solutions to Protect Your Organization

Ransomware has evolved over the years and is now targeting organizations of all sizes with both file encryption and information exfiltration. In 2024, 59% of organizations experienced at least one ransomware attack, costing them billions in losses from damage, downtime, and data loss. Though firewalls and antimalware programs have their merits, they alone cannot provide protection from both data encryption and theft.

A Comprehensive Look at Automated User Account Options and Practices

Each individual in your organization needs a user account to access data, applications, servers, cloud services and other resources. If you have just a few accounts, you may be able to create, secure and govern them throughout their lifecycle using manual processes. However, manual processes are highly prone to human errors and do not scale to meet the needs of any but the smallest businesses. Instead, most organizations need automated user management tools.

MobiFin and INETCO partner to deliver cutting-edge digital banking and payments security

MobiFin, a leading provider of unified digital banking and payment solutions, has entered into strategic partnership with INETCO, an innovative real-time transaction monitoring and fraud prevention company. INETCO has established a significant global footprint by implementing its innovative solutions across more than 27 nations, serving some of the most prominent financial powerhouses worldwide.

Building a Scalable Permissions Service: Overcoming Challenges in Access Control

Permissions are at the center of every operation at Egnyte. Every interaction any user has with the system is bound to go through a stringent permission check,be it creating a file, copying it, moving it, sharing it, deleting it or using an operation as simple as adding comments. The permissions model is extremely crucial as without it, data leaks, incorrect access escalations, and unauthorized operations can occur.

It's Typhoon Season: Attackers are deliberately evading EDR. What can you do about it?

Over the past year, several sophisticated cyber-espionage campaigns have grabbed the attention of our industry and challenged defenders and vendors alike with advanced tactics, techniques, and procedures (TTPs). One of the most visible campaigns is Volt Typhoon, named by the Microsoft threat intelligence team in May 2023 and attributed to Chinese state-sponsored threat actors.