https://galleries.upcontent.com/galleries/bd710fa5-311e-40b6-99fa-15da92d92881/collections/only/selections.json
What We Are Reading
Article Endpoint Security

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Onapsis and SAP say that cybercriminals are actively exploiting known SAP security vulnerabilities in the wild, sometimes with a cyber attack within 72 hours after patches are released.

Article Endpoint Security

Check Point Mobile Security Report 2021 Details Widespread Attacks

Check Point Software recently released its Mobile Security Report 2021. This report explores the threat landscape concerning business mobile devices.

Article Endpoint Security

Top cybersecurity M&A deals for 2021

2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry ... managed security services, DevSecOps and cloud security. In many cases, the acquiring company sought to strengthen its position in its market—Okta ...

Article Endpoint Security

Cloud Editions 21.2 Enables Organizations to Grow with OpenText

OpenText™ (NASDAQ: OTEX), (TSX: OTEX), today announced the release of OpenText™ Cloud Editions (CE) 21.2. The release was unveiled at OpenText World Europe during the opening keynote from OpenText CEO & CTO Mark J.

Article Endpoint Security

Tips to improve domain password security in Active Directory

Follow this advice to better secure domain passwords in a Microsoft environment.

Article Endpoint Security

Cloud Editions 21.2 Enables Organizations to Grow with OpenText

OpenText™ (NASDAQ: OTEX), (TSX: OTEX), today announced the release of OpenText™ Cloud Editions (CE) 21.2. The release was unveiled at OpenText World Europe during the opening keynote from OpenText CEO & CTO Mark J.

Blogs
Blog Endpoint Security

Covid-19 is Transforming Cybersecurity for Businesses

The on-going pandemic is a crucial enabler of initiating the digital transformation in cloud computing not just as an operating model but mainly as a technological shift. Many large and…

Blog Endpoint Security

Zoom Acquires Keybase to Add End-to-End Encryption

Could we have ever predicted that “Zoom-bombing” (similar to “photo-bombing” where a total stranger jumps in the middle of your frame as you take a selfie photo) would be a…