4 min read
    0

    The Catastrophic Cyberattack That Shook Healthcare to Its Co…

    In a recent earnings call, United Health Group, the parent company of Change Healthcare, speculated on the overall data breach costs. When all is said and done, the total tally may reach $1B if not more. During a hearing on May 1st, Andrew Witty, the...
    by   in Cybersecurity
    3 min read
    0

    Reflections on RSA Conference 2024

    Another RSA Conference (RSAC) has come and gone, leaving us with memories and insights. The conference, as always, was a vibrant kaleidoscope of experiences, encapsulating the rapid evolution of the cybersecurity landscape. Representing the OpenText ...
    by   in Cybersecurity
    3 min read
    0

    ArcSight cyDNA: Transform Cybersecurity Defenses with Adversary…

    OpenText is excited to announce the general availability of ArcSight cyDNA!  With revolutionary Adversary Signal Analytics, cyDNA provides threat awareness beyond your perimeter, and delivers actionable intelligence for complex operating environ...
    by   in Cybersecurity
    6 min read
    0

    Unlocking Security in Smart Contracts with Fortify SCA

    The decentralized revolution hinges on the secure foundation of smart contracts. For those unfamiliar, smart contracts are like any other agreement, only written in blockchain. They dictate certain actions and their outcome. However, because they are...
    by   in Cybersecurity
    5 min read
    0

    What's In Your Data?

    Data security is a risk-reward process because you just cannot protect everything, and you want to be judicious with encryption since there are performance and cost considerations. Yet the goal is to implement a reasonable degree of data-centric cybe...
    by   in Cybersecurity
    1 min read
    0

    Identiverse 2024: Unlocking the Future of Identity and Access…

    Hello IAM enthusiasts! We're excited about the upcoming Identiverse 2024 conference  happening from May 28-31 at the ARIA Resort and Casino in Las Vegas, Nevada. As event sponsors, you can locate us at booth #2529. Swing by to meet "Lash" LaRoux...
    by   in Cybersecurity
    6 min read
    0

    The Impact of the XZ Exploit on Open-Source Software: A Call…

    Last week at the Linux Foundation's North America Open Source Summit in Seattle, I presented on the challenges highlighted by a Forrester survey regarding the compliance of open-source software (OSS) during the intake process. I discussed how automat...
    by   in Cybersecurity
    1 min read
    0

    Help spread the word! The return of Cybersecurity User Group…

    We are thrilled to announce the return of our Cybersecurity User Groups. These events are all about connecting our customers with industry experts, sharing insights and staying in the loop with the latest product releases and roadmaps. For now, thes...
    by   in Cybersecurity
    9 min read
    0

    Insider Threats Demystified: Enhancing Security with ITDR and…

    Understanding Insider Threats Insider threats encompass a spectrum that includes both direct insiders with malicious or negligent intentions and compromised insiders manipulated by external forces. Within the landscape of an organization, these threa...
    by   in Cybersecurity
    5 min read
    1

    Growing Concern Over API Security

    The dialogue around application and service security often misses a critical component: the interface. Application Programmable Interfaces (APIs), the threads that weave through cloud applications and services, are prone to becoming significant vulne...
    by   in Cybersecurity