Data Security
The Future of CMMC 2.0 Compliance
In this blog, proven cybersecurity leader J. Carlos Vega (Colonel US Army, Retired) shares his perspectives on CMMC's future.
Under the Hood of Egnyte’s AI Engine
In this blog, Egnyte explains its deep experience with AI technologies and outlines the architecture that makes it powerful, flexible, and secure.
5 Ways to Protect Your Company’s Valuable Life Sciences Data
In this blog, Egnyte's Neil Jones discusses how Life Sciences firms can protect their mission-critical data by improving their data protection.
5 Key Considerations When Working with a CMMC Partner
In this blog, CISO of Network Coverage, Bridget Wilson, recaps five practical considerations to take into account when working with a potential CMMC technology partner.
4 Reasons Why SMBs Need To Prioritize Cybersecurity
Egnyte's Neil Jones offers 4 practical approaches SMBs can use to improve their cybersecurity protection and reduce the threat of ransomware.
Meet Egnyte’s Data Security Experts at Google Next
Egnyte will be attending and speaking at Google Next on Aug. 29-31 in San Francisco.
How to Make the Business Case for ISO 27001 Compliance
In this blog, Linda Baker from The Wyanoke Group discusses how she made the case for ISO 27001 certification at her company.
3 Ways to Meet CMMC Self-Assessment Requirements
Learn the pros and cons of the main approaches to CMMC self-assessments—DIY and outsourcing—and how Egnyte brings together the best of both worlds.
Discovering and Managing Sensitive Information in Microsoft Repositories
If you use Microsoft SharePoint, OneDrive, or Exchange Online to store and share your business content, you may be wondering how to protect it from unauthorized access, data breaches, or compliance violations. That's where Egnyte comes in. In this blog post, we will show you how Egnyte can scan for sensitive information in Microsoft repositories and provide alerts when it is exposed.