Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Arctic Wolf Acquires Habitu8 to Advance Security Awareness Training

Arctic Wolf’s acquisition of Habitu8 is a bold step forward in advancing security awareness training programs as attacks like phishing and credential theft continue to thrive. With 85% of attacks against organizations starting with human error, it’s perhaps not surprising that we continue to see low-quality, antiquated, and severely dated content recycled through organizations.

Forward Fix Live: Extending Zero Trust in the Cloud

Trying to make sense of your cloud security posture shouldn't mean flipping between multiple screens and inferring how traffic is behaving. Join this live event to see how you can monitor and verify your security posture across multiple clouds on a single screen.

Supply Chain Security, Compliance, and Privacy For Cloud-Native Ecosystems

Think of the software supply chain as every software element in your organization—from software development of internal systems to open source or third-party enterprise software to vendors, partners, and even past suppliers who still hold access to company data or IT systems. Attacks on this software supply chain can damage individual departments, organizations, or entire industries by targeting and attacking insecure elements of your software fabric.

Netskope Private Access Demo - Browser Access (Clientless)

In this video, we will demonstrate the new client-less Browser Access capabilities in Netskope Private Access (NPA). We will walk you through the configurations and show you how to securely enable access to web applications for contractors, suppliers, and other 3rd party users as well as employee BYOD.

Netskope Selected to Participate in ATARC Zero Trust Lab

We are pleased to share that Netskope has been selected by the Advanced Technology Academic Research Center (ATARC) as one of 49 vendors to participate in its Zero Trust Lab. The Zero Trust Lab is a state-of-the-art physical and virtual test environment that will provide federal agencies with the opportunity to build, test, and evaluate new Zero Trust Architectures in a simulated environment.

Devo Content Stream

Devo Content Stream arms security analysts with actionable content including curated alerts and threat intelligence to defend the organization more effectively against rapidly evolving threats. Content Stream not only delivers immediate out-of-the-box value to Security Operations, but it also updates alerts and threat intelligence on an ongoing basis to improve the speed and effectiveness of your security team.

Secret backdoor allegedly lets the REvil ransomware gang scam its own affiliates

REvil is one of the most notorious ransomware groups in the world. Also known as Sodin and Sodinokibi, REvil has made a name for itself extorting large amounts of money from businesses, operating as a ransomware-as-a-service (RAAS) business model that sees it share its profits with affiliates who break into networks and negotiate with victims on the group’s behalf.

How organizations handled incidents before and after deploying AIOps - Part 2

In this highly dynamic environment, organizations are looking for ways to innovate and manage resources efficiently. In the first part of the two-part blog series, we saw how organizations handled incidents without an AIOps solution and how long it took to resolve that incident — a scenario representing different steps to resolve an incident. In the second part of the two-part blog series, we look at how organizations were able to handle incidents after deploying AIOps.

Introducing Egnyte's Monthly Release Rollups

We’re kicking off a new series that will roll up our most recent product releases you need to know, all in one place. This first post will summarize some of the releases from the last few months. Moving forward, expect to see a post each month. We’re excited to share all the new features and product improvements we’ve been working on with you, so you can make the most of the Egnyte platform.