Line of Business
Why 91% of enterprises are looking for new integration solutions
Earlier this year, OpenText and IDG surveyed enterprises with more than 1,000 employees on ERP integration, including insights on their current system landscape, integration requirements,…
EDI vs API? It’s a false debate
According to EFT, 55 percent of supply chain executives considered web service APIs as an alternative to EDI. But we should know better by now than…
How to use EDI to promote fair play, sustainability and ethics
The electronic data interchange value-added network (EDI VAN) is primarily a service provider network that connects all supply chain participants—such as buyers, sellers, logistic providers,…
Demystifying cloud migration
The business world is repeatedly proving that cloud is fast, reliable, scalable and cost-effective. When it comes to greenfield cloud deployments, the business case for…
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…
Why in-place preservation is critical to the litigation hold process
The continued increase of litigation and the growth in volume and variety of eDiscovery data was already challenging over-burdened legal departments prior to the pandemic….
What is content and document rationalization?
Google Dictionary defines rationalization as “the action of making a company, process or industry more efficient.” At home, rationalization might mean organizing your garage or…
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…
Enrich EIM solutions with business intelligence
Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.