3 min read
    0

    ArcSight cyDNA: Transform Cybersecurity Defenses with Adversary…

    OpenText is excited to announce the general availability of ArcSight cyDNA!  With revolutionary Adversary Signal Analytics, cyDNA provides threat awareness beyond your perimeter, and delivers actionable intelligence for complex operating environ...
    by   in Cybersecurity
    6 min read
    0

    Unlocking Security in Smart Contracts with Fortify SCA

    The decentralized revolution hinges on the secure foundation of smart contracts. For those unfamiliar, smart contracts are like any other agreement, only written in blockchain. They dictate certain actions and their outcome. However, because they are...
    by in Cybersecurity
    5 min read
    0

    What's In Your Data?

    Data security is a risk-reward process because you just cannot protect everything, and you want to be judicious with encryption since there are performance and cost considerations. Yet the goal is to implement a reasonable degree of data-centric cybe...
    by   in Cybersecurity
    1 min read
    0

    Identiverse 2024: Unlocking the Future of Identity and Access…

    Hello IAM enthusiasts! We're excited about the upcoming Identiverse 2024 conference  happening from May 28-31 at the ARIA Resort and Casino in Las Vegas, Nevada. As event sponsors, you can locate us at booth #2529. Swing by to meet "Lash" LaRoux...
    by   in Cybersecurity
    6 min read
    0

    The Impact of the XZ Exploit on Open-Source Software: A Call…

    Last week at the Linux Foundation's North America Open Source Summit in Seattle, I presented on the challenges highlighted by a Forrester survey regarding the compliance of open-source software (OSS) during the intake process. I discussed how automat...
    by in Cybersecurity
    1 min read
    0

    Help spread the word! The return of Cybersecurity User Group…

    We are thrilled to announce the return of our Cybersecurity User Groups. These events are all about connecting our customers with industry experts, sharing insights and staying in the loop with the latest product releases and roadmaps. For now, thes...
    by   in Cybersecurity
    9 min read
    0

    Insider Threats Demystified: Enhancing Security with ITDR and…

    Understanding Insider Threats Insider threats encompass a spectrum that includes both direct insiders with malicious or negligent intentions and compromised insiders manipulated by external forces. Within the landscape of an organization, these threa...
    by in Cybersecurity
    5 min read
    1

    Growing Concern Over API Security

    The dialogue around application and service security often misses a critical component: the interface. Application Programmable Interfaces (APIs), the threads that weave through cloud applications and services, are prone to becoming significant vulne...
    by in Cybersecurity
    10 min read
    1

    Navigating PCI DSS 4.0

    In today’s digital age, the security of payment systems isn't just a feature—it's foundational to maintaining the integrity and trust in our financial ecosystem. As transactions increasingly move online, the potential for cyber threats gr...
    by in Cybersecurity
    7 min read
    0

    Navigating the Aftermath: The Change Healthcare Cyberattack

    The cybersecurity terrain within healthcare was abruptly upended by the cyberattack on Change Healthcare, marking a pivotal moment for the sector's digital defenses. This incident illuminated the stark vulnerabilities within our healthcare systems, s...
    by in Cybersecurity