Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Three Ways to Use Egnyte's New "Document Q&A" Service

Egnyte’s AI-powered document tools are easily accessed from the preview screen in the web interface. By clicking on a document in any folder, you are taken directly to the preview screen. Once in preview mode, access the AI-powered Document Q&A tool by expanding the right hand pane. There, you will see available tools such as Comments, Workflows, Details, and Egnyte’s new AI-powered document Summary and Q&A.

Balancing Commuting and Environmental Impact | Remote Work

We explore the evolving dynamics of commuting and its significance in today's world. Join us as we delve into the critical considerations of commuting's impact on both the environment and people's lives, all from the perspective of a manager striving to meet objectives. Discover how recent changes have reshaped the way we work, emphasizing the positive shifts towards more objective-driven management practices.

Fulfilling Access-Related NYDFS Cybersecurity Requirements

The New York Department of Financial Services (NYDFS) Cybersecurity Regulation, commonly referred to as NYCRR 500, lays out stringent cybersecurity requirements that financial companies operating in New York must adhere to. To navigate the complex landscape of NYCRR 500, companies are turning to innovative solutions like Entitle to streamline compliance efforts and bolster their cybersecurity posture. ‍

Choosing a PCI DSS 4.0 Compliance Product in 2023

With violation penalties of up to $100,000 per month until full compliance is achieved, every entity processing cardholder data can't afford to miss a PCI DSS compliance gap. But with the expanding digital landscape increasing the complexity of information security, complying with the Payment Card Industry Data Security Standard is difficult unless you leverage a product that can help you track your compliance efforts.

Open Source CyberSecurity Tools for Hardening

Open-source cybersecurity tools offer a prime solution for independent security experts, emerging businesses, and even medium to large enterprises aiming to tailor their security framework. These tools serve as a foundational platform for fostering security advancements, integrating proprietary software code and security automation scripts.

Why Phishing Takedowns Can Be Hard, and How to Simplify Them

Allow us to set the scene: It’s Wednesday morning, and one of your cyber threat analysts Slacks you to report a profile on social media that is impersonating your organization. The analyst has verified that the threat is part of a phishing campaign and wants to talk about how to approach a phishing takedown. Now, as threats go, this is probably not one that will have you spitting out your coffee.

The Evolution of Network Perimeters | Remote Work

In this video, we delve into the fascinating journey of network perimeters. Remember when the traditional network barrier seemed impenetrable? Join us as we explore how the shift to remote work initially signaled the demise of the conventional network perimeter. But guess what? We're not done with this story. With the return to office spaces, we're witnessing the resurgence of a more traditional network approach. However, it's clear that the landscape has forever changed. When was the last time you heard the term LAN thrown around?
Featured Post

It's not always malware

Every day, cyber incidents and their subsequent downtimes seem to fill the news. These downtimes, both costly and damaging to consumer trust, have rightfully been something that CISOs and CIOs work to prevent with increasingly sophisticated security measures. But sometimes the most damaging "disasters" are the simplest.

Privacy and Boundaries in Remote Work: The Webcam Conundrum

As remote work becomes the new normal, the question of privacy and boundaries has taken centre stage. Join us for an engaging discussion on the challenges of webcam surveillance in the digital age. In this video, we share intriguing anecdotes and thought-provoking scenarios that shed light on the delicate balance between oversight and respecting personal space. Discover the story of a colleague juggling work and family life, where a simple shift in perspective led to a crucial realization about safeguarding privacy. We delve into the implications of capturing personal moments on corporate servers and the potential ethical concerns that arise.