Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Interview

Between Two Cones | Mitigating Construction Project Risks with CCPI

In this video, CPPI’s Director of Technology, Brad Buckles, and Egnyte’s Senior Manager of AEC, Nick Decker, discuss mitigating risk in construction projects. Brad outlines his three pillars of risk management: safety, scheduling, and financial, and the tools, techniques, and proactive steps that CPPI takes to reduce their exposure and impact. Between Two Cones is a recurring leadership series featuring AEC experts speaking on the latest trends and most significant challenges the industry faces. Whether you’re a seasoned professional or new to the industry, there is something for everyone.

Hello CISO - Episode 3 (Part 2): Shadow IT and Working from Home

In part one of this episode of Hello CISO, Troy explored why regaining some of the control and visibility lost to shadow IT requires a mindset shift. In part two, he delves into where that mindset shift might lead us. Hello CISO is a new series aimed at Chief Information Security Officers, IT security teams, and all other members of an organization responsible for maintaining the safety and integrity of the business and its operations.

Insights from an MSP Partner | James Pray

Egnyte’s Director of MSP Community and Partner Enablement, Eric Anthony, catches up with initial.IT’s Vice President of Operations, James Pray, to talk about the advantages and benefits of Egnyte’s MSP program. In this video, Pray discusses how Egnyte helps him as an MSP and some of his favorite features of the software. Egnyte is trusted by more than 16,000 content-critical businesses worldwide.

How federal agencies can revamp their mobile security posture

Cybersecurity is an increasing concern for the federal government, particularly with a larger remote workforce to manage than in the past. Changes in the distributed nature of IT networks make it even more critical to stay ahead of newer threats like ransomware and spyware. Lookout’s Vice President for Public Sector Tony D’Angelo, in a new CyberScoop interview, highlights the importance of reprioritizing mobile device security to establish a more secure network security posture. D’Angelo explains how mobile threat defense solutions help security leaders safeguard sensitive enterprise data from cyberthreats that exploit users, apps and devices. He also highlights endpoint detection and response strategies that elevate mobile security when implementing a zero-trust architecture. Watch the full interview with Tony D’Angelo and learn more about reprioritizing mobile device security to establish a more secure network security posture.

Hello CISO - Episode 3 Part 1: Shadow IT and Working from Home

The migration from the office to WFH exposed a growing security threat that’s been on IT’s radar for years: shadow IT. With more and more workers using apps and services outside the purview of IT, a new way of thinking has emerged to confront the new reality. In part one of this episode of Hello CISO, Troy explains why shadow IT is here to stay, and why the loss of control that it brings isn’t the end of the world.

SecurityScorecard Acquires LIFARS; Empowers Orgs w/ View of Cyber Risk & Path to Cyber Resilience

Watch a video message from Aleksandr Yampolskiy, SecurityScorecard CEO & Co-Founder and Ondrej Krehel, LIFARS' CEO & Founder, about the customer benefits of this winning combination.

Insights from an MSP Partner | Matt Lee

Egnyte’s Director of MSP Community and Partner Enablement, Eric Anthony, catches up with Pax8’s Senior Director of Security and Compliance, Matt Lee, to talk about the advantages and benefits of Egnyte’s MSP program. In this video, Lee discusses some of his favorite features of Egnyte and how they help him keep his users secure. Egnyte is trusted by more than 16,000 content-critical businesses worldwide.