The Evolution of Cybercrime as a Service
BrandPost OpenText™

The Evolution of Cybercrime as a Service

The Evolution of Cybercrime as a Service You’ve likely heard of software as a service (SaaS), infrastructure as a service (IaaS), and numerous other “as-a-service” platforms that help support the modern business world. What you...

Ransomware: Exploring the Hidden Costs
BrandPost OpenText™

Ransomware: Exploring the Hidden Costs

The true cost of ransomware extends beyond the ransomware payment. Case and point: In early 2021, CNA Financial Corp., one of the largest insurance companies in the U.S., paid a $40 million ransom to hackers after an attack left...

Lessons from Critical Infrastructure Attack Vectors: The Need for Cyber Resilient Infrastructure
BrandPost OpenText™

Lessons from Critical Infrastructure Attack Vectors: The Need for Cyber Resilient Infrastructure

Antiquated infrastructure in the United States is not confined to crumbling roads and bridges. Recent events have shown that connected devices in our cell towers, pipelines, water treatment facilities and power grids remain...

Understanding DoH Challenges: A Necessary Step in Improving Network Privacy & Security
BrandPost OpenText™

Understanding DoH Challenges: A Necessary Step in Improving Network Privacy & Security

Before 1983, finding a resource on the burgeoning collection of networks and computers that would become the internet meant either having to know the IP address or having to reference a manually maintained host file. DNS, or...

SMBs in the Crosshairs: No Size Too Small for Cyberattacks
BrandPost OpenText™

SMBs in the Crosshairs: No Size Too Small for Cyberattacks

Protecting systems and devices has never been more challenging. Attack surfaces continue to expand and cybercriminals use increasingly sophisticated methods to gain entry into organizations. It’s a mistake to think that small and...

Engineering Defense in Depth 2.0: Securing with Intelligence
BrandPost OpenText™

Engineering Defense in Depth 2.0: Securing with Intelligence

Deeply interwoven third-party vendor relationships have fundamentally changed business. They’ve allowed organizations to establish complex supply chains and sophisticated digital capabilities. Yet, all the gain isn’t without a...

Why are SMBs Under Attack by Ransomware
BrandPost OpenText™

Why are SMBs Under Attack by Ransomware

It’s no secret that the scope and severity of ransomware attacks are on the rise. Yet, what often flies under the radar of small and medium-size businesses (SMBs) is that the target is not only larger enterprises. An overwhelming...

Hunting Hackers: Reducing the Time to Discovery
BrandPost OpenText™

Hunting Hackers: Reducing the Time to Discovery

Research conducted by IBM and the Ponemon Institute shows the time to detect a data breach for businesses averages 280 days - a significant gap between the time a network is compromised and its discovery. The Codecov and...

Load More
Top Blog Posts