Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How Security & IT Teams Can Manage the Shift to the New Normal

The COVID-19 pandemic has disrupted businesses in ways that few had planned for, resulting in shutdowns, global economic downturn, supply chain volatility, and a sudden uptick in e-commerce and remote work. The disruption is straining security and IT teams who have to quickly respond and adapt to a series of unanticipated business events. How can security and IT teams stay agile, enable business resilience, and manage the shift to the new normal?

How to reduce your attack surface with system hardening in 2021

The goal of system hardening (or security hardening) is to reduce the attack surface. It includes reducing security risks and removing potential attack vectors. By removing superfluous programs, accounts functions, applications, ports permissions access etc., the reduced attack surface means the underlying system will be less vulnerable, making it harder for attackers or malware to gain a foothold within your IT ecosystem.

QuickTip // Smart Cache

Egnyte’s Smart Cache hybrid solution ensures users have fast access to content even when they work with large files at locations with low bandwidth. Smart Cache automatically caches frequently accessed files to the on premises storage for access at LAN speed. Once the cached content is no longer in consistent use, it is released, freeing up storage space. And you can sync specific folders to Smart Cache, ensuring users always have access to those folders even in the event of an internet outage.

Netskope CTE and CrowdStrike Demo

Together, Netskope and CrowdStrike deliver a comprehensive view of threats across web, cloud, and endpoints and work together to respond more quickly and effectively to those threats. By sharing threat intelligence and investigation artifacts Netskope and CrowdStrike can ensure newly discovered threats are quickly identified, endpoints protected, and the threat neutralized across the organization. Additionally, Netskope is able to identify those endpoint devices that are secured by CrowdStrike and granularly control cloud access and activities of any endpoints where the CrowdStrike agent is not installed.

The Right Steps to SASE: Refactor Internal Data Center Controls to Closed Loop Risk Management

The following is an excerpt from Netskope’s recent book Designing a SASE Architecture for Dummies. This is the sixth in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. Throughout this series, we repeat that the data center is just one more place people and data have to go—it’s no longer the center of attention.

That's A Data Problem - How Do Security Programs Drive Business Results?

The sheer number of cybersecurity attacks against companies continues to grow, and with accelerated cloud transformation, IT teams are facing new challenges. To drive innovation and stay competitive, companies need to ensure they are using cloud securely, prioritizing a security first approach and mitigating risks to drive business results.