Security
Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR)
It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these attacks was against JBS, the…
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…
5 leadership lessons from the pandemic
Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…
Addressing cyber resilience gaps across key infrastructure assets
The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…
4 reasons why technology is vital—during and after ‘unprecedented’ times
Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around the world adapted to the…
Banks are fighting a multi-front war on fraud
According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent increase in cyber attacks in…
Why information assurance and security is important in 2021
In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises two questions: How do you…
Announcing OpenText Security and Protection Cloud CE 21.2
Forensic investigators and examiners are overwhelmed with the amount of evidence they must collect and examine, case logs are growing, and their investigative capacity is…
Security in the healthcare spotlight
One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to remote platforms and telehealth has…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.