Build Your CMMC Roadmap Now for More DoD Business in the Future
May 3, 2022
Is your business ready for CMMC? Take these steps to comply with the federal cybersecurity requirements and win more DoD contracts.
The Fundamental Steps Every IT Admin Must Take to Prevent Ransomware
June 11, 2020
For enterprises that have at least some part of their IT environment in the cloud, the key to protecting data starts with understanding the layers of the cloud stack and their corresponding security risks...
6 Ways Ransomware Attackers Steal Your Data, And How IT Admins Can Stop Them
June 8, 2020
As companies invest in stronger firewalls and better IT infrastructure, brute force attacks have become harder to pull off. That’s the good news...
Egnyte’s Chief Security Officer Provides Practical Advice for IT Admins Of a Remote Workforce
May 1, 2020
Companies around the globe scrambled to make work life productive for their employees once health and government mandates instructed offices to close...
Anatomy of a Ransomware Attack
August 21, 2019
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank...
The Safe (and Unsafe) Ways to Use Public Links for Collaboration
March 14, 2019
Earlier this week security firm Adversis published an article that exposed a vulnerability with a consumer-grade file sharing provider, which was created by the use of public links...
What Could Losing One Terabyte of Data Cost Your Business?
February 28, 2019
It’s no secret that your digital footprint is growing. Whether your business has 10 employees in one office or 2,000 employees in offices all over the world, you’re creating more content today...
How Could a GDPR-like US Law Raise Constitutional Concerns?
June 21, 2018
Should We Trust Good-Guy Hackers?
June 12, 2018
How to Avoid GDPR Penalties
May 30, 2018
Don’t Forget The Right to be Forgotten
May 29, 2018
How Bug Bounty Hunters Can Leverage GDPR
May 25, 2018
10 Things to Do to Prepare for GDPR
May 22, 2018
Data Classification Trends To Keep in Mind in 2018
May 21, 2018
The Importance of GDPR in the Workplace
May 16, 2018
Anyone Can Lose Control Of Their Data
May 10, 2018
GDPR: 11 Articles to Help Prepare Your Business
April 10, 2018
U.S. Businesses Can't Hide From GDPR
March 27, 2018
Breaches Are Costing Companies Much More Than Money
March 13, 2018
Why GDPR is Keeping CIOs Up at Night
February 5, 2018
Meltdown & Spectre Vulnerabilities in Modern CPUs
January 5, 2018
GDPR: Compliance with a Click
October 19, 2017
DPO or no DPO? That’s the question
October 18, 2017
Q&A: Importance of virtualisation with Egnyte CSO Kris Lahiri
October 16, 2017
Equifax Hack: What Went Wrong, Again
October 4, 2017
GDPR: Don’t Forget The Right to be Forgotten
September 11, 2017
GDPR: Should Your Organization Purchase Cyber Insurance?
August 4, 2017
You’ve Been Breached, What Now?
July 7, 2017
Petya Ransomware Update
June 28, 2017
The Ultimate GDPR Checklist: 8 Things Everyone Needs to Do Before May 2018
June 4, 2017
Egnyte Update on Global Ransomware Attack
May 15, 2017
It’s Tax Time! How Will the Financial Industry Be Affected by the GDPR?
April 25, 2017
GDPR: Controller or Processor? Here’s What You Need to Know
March 30, 2017
How Organisations Should Be Preparing for the GDPR
February 28, 2017
GDPR and Brexit: How Leaving the EU Affects UK Data Privacy
January 27, 2017
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS
October 26, 2016
Reduce Human Error with Egnyte Protect's Best of Breed Content Governance
August 18, 2016
Egnyte Protect is a smart content governance solution designed to help companies find, protect and manage content easily across repositories.
Seizing Opportunity: How Egnyte Adopted a Hybrid Frame of Mind
June 1, 2016
Protecting the Perimeter: Egnyte at the WSTA
April 28, 2016
Introducing Egnyte Key Management
March 1, 2016
3 Reasons Egnyte Built a European Data Center… Back in 2010
October 26, 2015
3 Reasons Egnyte Built a European Data Center
Are Financial Teams Moving to the Cloud?
May 12, 2015
How to Defend Your Business During the Four Stages of a Cyber-Attack
February 6, 2015
Data Privacy Day: Tips for Protecting Your Users
January 28, 2015
Why 'Bring Your Own Cloud' Forces IT to Take Action
November 17, 2014
Addressing Industry Security Needs at the IdentityFirst Summit
November 7, 2014
7 Must-Have Cloud Security Controls for Every Company
April 21, 2014
Egnyte Unaffected by Heartbleed Vulnerability
April 15, 2014
Mapping Out Egnyte’s 2014 Security Roadmap at RSA
February 25, 2014
Run your Business at Mach Speed
August 27, 2013
Keeping ever vigilant
February 5, 2013
A Note From Our Chief Security Officer
July 26, 2012