
How AI can alleviate data lifecycle risks and challenges
The volume of business data worldwide is growing at an astounding pace, with some estimates showing the figure doubling every year. Over time, every company generates and …
Egnyte’s new capabilities accelerate data discovery and boost security
Egnyte, the only secure content platform built for business, announced new content intelligence and security capabilities that will improve discovery, structure, task …

Believe the hype, but control the threat: Reducing the risk of ransomware
Ransomware is becoming an epidemic for any collection or repository of data. Each day the attacks seem to be getting larger and more lucrative for cybercriminals. According to …
Easy NX Connect for Egnyte enables fast and secure file sharing
Fujitsu Computer Products of America, the established leader in document imaging, announced a new integration with the FUJITSU fi-7300NX document scanner and Egnyte. Easy NX …

Anatomy of a ransomware attack: How attackers gain access to unstructured data
Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and …

Hybrid data storage is growing rapidly in the digital workplace
82% of businesses are currently deploying a mix of cloud and on- premises infrastructure. Egnyte analyzed over 14 petabytes of data across thousands of businesses worldwide to …

Five ways to prevent data leaks
The story still strikes fear into the hearts of IT departments: As many as 70 million credit- and debit card accounts were compromised in less than a month during the Target …
Featured news
Resources
Don't miss
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help
- 3 DevOps security pitfalls and how to stay ahead of them
- CISA warns of Windows SMB flaw under active exploitation (CVE-2025-33073)