Security

DevSecOps: It’s Time to Level Up (with a Little Help from AI) 

On Sept 24, we’re not just talking about the future – we’re building it. We’re diving into how AI is turbocharging DevSecOps, making it faster, smarter, and more secure.

September 13, 2024 3 minute read
MITRE Engenuity’s ATT&CK R3

MITRE Engenuity’s ATT&CK R3

The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…

5 minute read

Top 5 differences between information assurance vs. cybersecurity

Top 5 differences between information assurance vs. cybersecurity

There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…

8 minute read

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser and third-party applications such as…

6 minute read

5 leadership lessons from the pandemic

5 leadership lessons from the pandemic

Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals rushed to take advantage of…

4 minute read

Addressing cyber resilience gaps across key infrastructure assets

Addressing cyber resilience gaps across key infrastructure assets

The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach for securing operations. In the past…

5 minute read

4 reasons why technology is vital—during and after ‘unprecedented’ times

4 reasons why technology is vital—during and after ‘unprecedented’ times

Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around the world adapted to the…

4 minute read

Banks are fighting a multi-front war on fraud

Banks are fighting a multi-front war on fraud

According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent increase in cyber attacks in…

4 minute read

Why information assurance and security is important in 2021

Why information assurance and security is important in 2021

In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises two questions: How do you…

8 minute read

Announcing OpenText Security and Protection Cloud CE 21.2

Announcing OpenText Security and Protection Cloud CE 21.2

Forensic investigators and examiners are overwhelmed with the amount of evidence they must collect and examine, case logs are growing, and their investigative capacity is…

3 minute read

Security in the healthcare spotlight

Security in the healthcare spotlight

One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to remote platforms and telehealth has…

4 minute read

Lessons from the SolarWinds attack: How to protect your business

Lessons from the SolarWinds attack: How to protect your business

By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated at least 18,000 government agencies,…

5 minute read

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

The HAFNIUM Attack on the on-premises Microsoft Exchange Server

On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks observed, the threat actor used…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up