Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Certify Documents Stored in Egnyte With Blockchain Technology

Businesses want irrefutable proof that the lineage and integrity of their critical documents are sound. Typically, this requires implicit trust in centralized systems and audit processes, but this framework runs counter to the current trend of using decentralized value chains. To address this contradiction, Egnyte is excited to announce a new way for its users to certify documents—a document stamping service that addresses an essential need for many businesses in highly regulated industries.

How to Conquer Remote Code Execution (RCE) in npm

Recently, there have been some remote code execution (RCE) attacks that included just a single line of well-built code that can run a remote shell. Let’s take a look at why and how these attacks work, why npm is particularly susceptible, what could happen if they get into machines, and how to detect and fix them.

Data Protection Is Not Just A Cyber Conversation

Before I became an advisor to Netskope, I was a long serving CIO and CEO for organisations including Bayer and Philips. I have spent many hours sitting in board meetings discussing data protection with colleagues and as a result I am confused by assertions I hear that data protection is only the IT team’s problem. In my experience, the majority of data protection conversations that reach the board are, in fact, driven by legal teams, who then partner with IT to devise and execute plans.

Yet Another Perspective on Prototype Pollution

JavaScript is a programming language based on prototypes instead of classes. When a new object is created, the features of the prototype object are inherited – this includes arrays, functions, and even class definitions. The new object can also act as a template for other inheriting objects, transferring its properties, and creating the prototype chain.