In recent years, organizations around the world realized that a new era of cyber threats had dawned. Ransomware has advanced significantly and is now capable of taking out...
Learn how Zero Trust principles apply to enterprise IT devices and why these principles need to extend down to the base hardware of chips, processors and system components.
...
Egnyte worked with an independent research firm to conduct a 15-question survey among 400 companies in North America to learn about trends related to: cybersecurity hygiene,...
What constitutes a “bug bounty” and how programs differ across organizations.
Top tips for launch and how to grow and measure the impact of your bug bounty program.
The...
How the next generation of Penetration Testing as a Service (PTaaS) is addressing the shortcomings of traditional services.
What new research indicates about changing attitudes...
Learn how firmware security fits into this widely used framework that tracks and maps adversary actions.
Find out which tactics and techniques are leveraging firmware vulnerabilities...
Two intersecting trends — the recent firmware explosion and rampant ransomware — have caused havoc and made security teams question their previous strategies.
This...
As firmware-level threats continue to gain popularity in the wild, security teams need to understand how these threats work and the real-world risks they pose to an organization’s...
Every piece of information and communications technology (ICT) equipment in an organization today is an amalgamation of chips, components, and code from a convoluted chain...
The cybersecurity teams who defend financial services organizations are engaged in what often feels like hand-to-hand combat with financially and politically motivated adversaries.
Teams...