Technologies
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…
Providing a superior experience for commercial banking customers
The banking industry—which includes retail banks and credit unions, wealth and asset management firms, and corporate and treasury divisions—faces severe challenges. It’s become more important…
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…
What’s new in OpenText eDOCS CE 21.2
Law firms and legal departments store thousands of matter-related documents for existing clients. When lawyers and their teams are pressured by deadlines or have a…
Where are organizations on the low-code development journey?
Many organizations that initially used enterprise content management (ECM) systems to tackle large-scale, document-intensive processes have taken a multi-phased approach to process automation. Driven by…
5 leadership lessons from the pandemic
Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…
ERP systems are still plagued by bad data
The enterprise resource planning (ERP) software market is set for rapid growth. Worth approximately $39 billion in 2019, it is set to reach $78.4 billion by…
Addressing cyber resilience gaps across key infrastructure assets
The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…
How to implement a new software system
The efficiency, productivity and innovation for an organization can stem from implementing the latest software applications in a timely and effective manner. This represents a…
The strategic value of low-code development
With organizations continuing to push toward digital transformation, the developers and business analysts within these businesses hold the key to accelerate this evolution. Under pressure…
4 reasons why technology is vital—during and after ‘unprecedented’ times
Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around the world adapted to the…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.