Latest Articles

Beyond Blueprints – A Guide to Data Driven Construction

Harness the Power of Data to Transform Traditional Practices Most AEC professionals rely on years of experience and instinct. The advent of a centralized, cloud platform has led to a paradigm shift, with data now driving decisions. Egnyte’s Beyond Blueprints Ebook outlines how to embrace the change and harness the power of data for:• Secure […]

Read →

Failure To Protect Keys And Certificates Undermines Critical Security Controls

Advanced Persistent Threat (APT) operators have proven they can breach enterprises like yours by undermining your critical security controls when you fail to protect digital certificates and cryptographic keys. Not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems […]

Read →

Stop Unauthorized Privileged Access

For most organizations, Secure Shell (SSH) key credentials are left unprotected and leave the door open to be exploited. While SSH keys are often used to secure access to the most sensitive systems and data, there is usually little awareness or policy enforcement in place around their use.  Read this solution brief to better understand […]

Read →

Eliminate Blind Spots In SSL Encrypted Traffic

While SSL/TLS provides privacy and authentication, it also creates a blind spot for enterprise security. Cybercriminals can use SSL to hide their exploits from an organization’s security controls, including Next Generation Firewalls (NGFW), Intrusion Prevention Systems (IPS), anti-malware, and more.  Gartner estimates that by 2017, more than 50% of network attacks will use SSL/TLS.  This […]

Read →

Surescripts Moves To Decisively Reduce Risk

As a provider of IT services to the healthcare industry, Surescripts needs to assure trusted exchanges of confidential health information. To maintain this trust, Surescripts turned to Venafi to improve key and certificate processes with its customers and reduce risk by securing these critical cryptographic assets. “Now that we have a huge amount of accountability […]

Read →

Predictions 2015: Data Security And Privacy Are Competitive Differentiators

Love him or hate him, Edward Snowden’s revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the European Union (EU) was threatening to scrap the Safe Harbor Agreement, enterprises shelved their plans to adopt cloud services from US-based providers, and tech giants like Apple and Google […]

Read →

Achieve Successful Data Protection

The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights