Technologies

Demystifying cloud migration

Demystifying cloud migration

The business world is repeatedly proving that cloud is fast, reliable, scalable and­ cost-effective. When it comes to greenfield cloud deployments, the business case for…

July 8, 2021 5 minutes read
Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…

July 6, 2021 1 minute read
How to select the best endpoint security solutions in 2021

How to select the best endpoint security solutions in 2021

The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…

July 6, 2021 10 minutes read
Why in-place preservation is critical to the litigation hold process

Why in-place preservation is critical to the litigation hold process

The continued increase of litigation and the growth in volume and variety of eDiscovery data was already challenging over-burdened legal departments prior to the pandemic….

July 6, 2021 4 minutes read
How to handle chat data in eDiscovery and investigations

How to handle chat data in eDiscovery and investigations

Water-cooler talk and quick chats in the office disappeared with the pandemic. But online chat—already a prevalent form of communication prior to the pandemic—took off…

June 18, 2021 5 minutes read
Takeaways from the recent OpenText Core Content webinar

Takeaways from the recent OpenText Core Content webinar

If you attended the recent webinar, “Introducing OpenText™ Core Content, the next generation SaaS content services platform” then you are already familiar with how lively…

June 16, 2021 5 minutes read
Why you need a top digital experience platform in 2021

Why you need a top digital experience platform in 2021

The COVID-19 pandemic has accelerated a social and technology trend that has been happening for some time. The way we live our lives and conduct…

June 11, 2021 7 minutes read
JBS Ransomware attack highlights need for early detection and rapid response

JBS Ransomware attack highlights need for early detection and rapid response

Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…

June 9, 2021 4 minutes read
Enrich EIM solutions with business intelligence

Enrich EIM solutions with business intelligence

Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line. In the current climate, solutions…

June 8, 2021 5 minutes read
MITRE Engenuity’s ATT&CK R3

MITRE Engenuity’s ATT&CK R3

The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…

June 8, 2021 5 minutes read
Top 5 differences between information assurance vs. cybersecurity

Top 5 differences between information assurance vs. cybersecurity

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…

June 7, 2021 8 minutes read
Providing a superior experience for commercial banking customers

Providing a superior experience for commercial banking customers

The banking industry—which includes retail banks and credit unions, wealth and asset management firms, and corporate and treasury divisions—faces severe challenges. It’s become more important…

June 7, 2021 2 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.