Security

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

July 23, 2024 5 minute read
A day in the life of evidence: Part 1

A day in the life of evidence: Part 1

Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police precincts contained large evidence rooms,…

4 minute read

What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator

What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator. Check out the latest…

3 minute read

Modern viewing and collaboration for the secure remote workforce

Modern viewing and collaboration for the secure remote workforce

Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to enable your workforce to work…

2 minute read

Announcing OpenText Security & Protection Cloud CE 21.3

Announcing OpenText Security & Protection Cloud CE 21.3

Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of resources to effectively detect and…

3 minute read

Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…

1 minute read

How to select the best endpoint security solutions in 2021

How to select the best endpoint security solutions in 2021

The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…

10 minute read

JBS Ransomware attack highlights need for early detection and rapid response

JBS Ransomware attack highlights need for early detection and rapid response

Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…

4 minute read

MITRE Engenuity’s ATT&CK R3

MITRE Engenuity’s ATT&CK R3

The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…

5 minute read

Top 5 differences between information assurance vs. cybersecurity

Top 5 differences between information assurance vs. cybersecurity

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…

8 minute read

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

6 minute read

5 leadership lessons from the pandemic

5 leadership lessons from the pandemic

Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…

4 minute read

Addressing cyber resilience gaps across key infrastructure assets

Addressing cyber resilience gaps across key infrastructure assets

The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.