Line of Business

Why in-place preservation is critical to the litigation hold process

Why in-place preservation is critical to the litigation hold process

The continued increase of litigation and the growth in volume and variety of eDiscovery data was already challenging over-burdened legal departments prior to the pandemic….

July 6, 2021 4 minutes read
What is content and document rationalization?

What is content and document rationalization?

Google Dictionary defines rationalization as “the action of making a company, process or industry more efficient.” At home, rationalization might mean organizing your garage or…

June 24, 2021 4 minutes read
JBS Ransomware attack highlights need for early detection and rapid response

JBS Ransomware attack highlights need for early detection and rapid response

Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…

June 9, 2021 4 minutes read
Enrich EIM solutions with business intelligence

Enrich EIM solutions with business intelligence

Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…

June 8, 2021 5 minutes read
MITRE Engenuity’s ATT&CK R3

MITRE Engenuity’s ATT&CK R3

The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…

June 8, 2021 5 minutes read
Top 5 differences between information assurance vs. cybersecurity

Top 5 differences between information assurance vs. cybersecurity

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…

June 7, 2021 8 minutes read
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

June 3, 2021 6 minutes read
What’s new in OpenText eDOCS CE 21.2

What’s new in OpenText eDOCS CE 21.2

Law firms and legal departments store thousands of matter-related documents for existing clients. When lawyers and their teams are pressured by deadlines or have a…

May 28, 2021 3 minutes read
5 leadership lessons from the pandemic

5 leadership lessons from the pandemic

Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…

May 20, 2021 4 minutes read
ERP systems are still plagued by bad data

ERP systems are still plagued by bad data

The enterprise resource planning (ERP) software market is set for rapid growth. Worth approximately $39 billion in 2019, it is set to reach $78.4 billion by…

May 18, 2021 6 minutes read
Addressing cyber resilience gaps across key infrastructure assets

Addressing cyber resilience gaps across key infrastructure assets

The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…

May 18, 2021 5 minutes read
Early adopter in a laggard industry: Accelerating tech innovation in insurance

Early adopter in a laggard industry: Accelerating tech innovation in insurance

In an industry generally known for slow adoption of technology, one insurance business discovered that the COVID-19 pandemic provided the catalyst it needed to prioritize…

May 17, 2021 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.