Tue.Jul 20, 2021

Data Analytics: 3 Critical Questions

Data Breach Today

EY's Maryam Hussain on Launching a Successful Project Launching a successful data analytics project requires asking three critical questions, says Maryam Hussain, partner, forensic and integrity services at Ernst & Young in the U.K.

Spam Kingpin Peter Levashov Gets Time Served

Krebs on Security

Peter Levashov, appearing via Zoom at his sentencing hearing today.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Can the US Curb China's Cyber Ambitions?

Data Breach Today

Security Experts Weigh the Impact of White House's Latest Cyber Moves Many security experts and analysts are applauding the U.S. for calling out China's cyber behavior, especially after the White House had focused so much attention on Russia's cyber activities. But some are calling for bolder actio

NSO Group Hacked

Schneier on Security

NSO Group, the Israeli cyberweapons arms manufacturer behind the Pegasus spyware — used by authoritarian regimes around the world to spy on dissidents, journalists, human rights workers, and others — was hacked. Or, at least, an enormous trove of documents was leaked to journalists.

Address the Challenges of Siloed Monitoring Tools

Companies frequently experience monitoring tool sprawl. Find out why monitoring tool sprawl occurs, why it’s a problem for businesses, and the positive business impacts of monitoring tool consolidation.

TSA Issues Cybersecurity Requirements for Pipelines

Data Breach Today

Agency Cites 'Ongoing Cybersecurity Threat' The U.S. Transportation Security Administration issued a directive Tuesday requiring owners and operators of oil and natural gas pipelines to implement several cybersecurity controls.

More Trending

Case Study: A REvil Ransom Negotiation

Data Breach Today

Security Firm Elliptic Illustrates How Group Was Willing to Reduce Its Demands The blockchain analysis firm Elliptic offers a step-by-step case study, based on its research, of how one victim of the REvil ransomware gang negotiated a lower ransom payment.

16-Year-Old HP Printer-Driver Bug Impacts Millions of Windows Machines


The bug could allow cyberattackers to bypass security products, tamper with data and run code in kernel mode. Vulnerabilities

Researchers Found Flaws in Telegram's Cryptographic Protocol

Data Breach Today

MTProto Has Since Been Patched Security researchers identified flaws in messaging app Telegram's cryptographic protocol, MTProto, that enabled intruders to access encrypted chats and alter the messages. Those flaws have since been patched

A 16-year-old bug (CVE-2021-3438) in printer driver affects millions of printers worldwide

Security Affairs

Experts warn of a 16-year-old vulnerability (CVE-2021-3438) in an HP, Xerox, and Samsung printers driver that an attacker could exploit to gain admin rights on systems.

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Leak of Alleged Pegasus Target List Restokes Spyware Debate

Data Breach Today

Sales 141

A New Approach to Finding Cybersecurity Talent: A Conversation with Alan Paller

eSecurity Planet

A group of technology luminaries have launched an effort to find and train a new generation of cybersecurity talent, an effort that will gain steam tomorrow with The Cyber Talent CIO Forum.

Elekta Health Data Breach Victim Count Grows

Data Breach Today

Swedish Vendor's Recent Cyber Incident Leads to More Notifications The number of U.S. healthcare entities affected by a recent cyber incident targeting a Sweden-based provider of oncology radiation systems and related services is growing.

Announcing OpenText Content Cloud CE 21.3

OpenText Information Management

Succeeding in a modern work landscape of remote resources, dispersed processes and ever-increasing volumes of digital content requires a new generation of content management tools.

Cloud 63

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Kelihos botmaster Peter Levashov gets time served

Security Affairs

A US federal judge sentenced Russian hacker Peter Levashov to 33 months, time served, and three years of supervised release for his role in operating the Kelihos botnet.

Announcing OpenText AI and Analytics CE 21.3

OpenText Information Management

The amount of content and data available to organizations is ever-increasing. It’s reached a point where 95% of businesses consider managing unstructured data a problem.

A bug in Fortinet FortiManager and FortiAnalyzer allows unauthenticated hackers to run code as root

Security Affairs

Fortinet fixes a serious bug in its FortiManager and FortiAnalyzer network management solutions that could be exploited to execute arbitrary code as root.

Announcing OpenText Security & Protection Cloud CE 21.3

OpenText Information Management

Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of resources to effectively detect and respond to security threats before they become serious breaches.

Cloud 60

9 Developer Enablement Practices to Achieve DevOps at Enterprise Scale

In this eBook, Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.

Microsoft secured court order to take down domains used in BEC campaign

Security Affairs

Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft’s Digital Crimes Unit (DCU) has seized 17 domains that were used by scammers in a business email compromise (BEC) campaign aimed at its customers.

Announcing OpenText CE 21.3 for Digital Process Automation

OpenText Information Management

Digital process automation continues to drive digital transformation projects, maximizing the value of information and ensuring governance by automating business processes, enabling better decision-making, and improving customer, partner and employee experiences.

How To Estimate Your Document Automation Potential


Understanding the Key Factors that Affect How Much Document Automation You Can Achieve. When the word “automation” is brought up in a conversation, most people think of something that is completely handed over to machines.

Paper 52

Announcing OpenText Developer Cloud CE 21.3

OpenText Information Management

The new OpenText™ Developer Cloud continues to be updated with our new commercial North American availability zone. Now an OpenText Developer subscriber can deploy their apps for their North American customers in the same high availability area as our Core brand of SaaS products are deployed.

Cloud 56

The Forrester Wave™: B2B Marketing Data Providers, Q2 2021

In our 24-criterion evaluation of B2B marketing data providers, we identified the 11 most significant vendors — Data Axle, Dun & Bradstreet, Enlyft, Global Database, InsideView, Leadspace, Oracle, SMARTe, Spiceworks Ziff Davis, TechTarget, and ZoomInfo Technologies — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2B marketing professionals select the right one for their needs.

How the Rocket® TRUfusion™ Enterprise Enhancements Are Advancing Product Design

Rocket Software

Today, Rocket announced enhancements to their TRUfusion Enterprise software, a cost-effective solution to facilitate collaboration in product design processes.

Announcing OpenText Experience Cloud CE 21.3

OpenText Information Management

Modern customer experiences are personalized experiences. Customers expect you to tailor your communications, websites, support, and even in-person interactions to suit their needs, preferences, and interests.


IG Guru

Palmyra, NJ (July 15, 2021) – The ARMA International Educational Foundation (Foundation) is pleased to announce it will administer La ARMA Nostra’s 2021 Reimbursement Grant Program.

Announcing OpenText Business Network Cloud CE 21.3

OpenText Information Management

In OpenText™ Business Network CE 21.2, we introduced our initial suite of API connectors for integrating to SAP S/4HANA. These API connectors allow our OpenText™ Trading Grid™ platform to seamlessly integrate between the outside business environment and an internal S/4HANA environment. CE 21.3

Cloud 56

4 AI Hacks to Make Sales Teams More Efficient

Over the last two years, there’s been a 76 percent increase in AI adoption across sales organizations. For sales teams, AI opens up a world of new possibilities, including automating outreach, identifying best-fit buyers, and keeping CRMs flush with fresh data. Read on to learn the four AI hacks sales teams need to improve their performance. Download the eBook today!

Webinar Recap: Get the Most Out of Your Slack Early Case Assessment

Hanzo Learning Center

One of the keys to managing the cost of ediscovery—and litigation more broadly—is effective early case assessment (ECA). When you can quickly and accurately predict the future of a case, you’re more likely to, as Kenny Rogers would say, know when to hold ’em and know when to fold ’em.


Accelerate your digital journey with OpenText Cloud Editions 21.3

OpenText Information Management

Organizations are embracing the cloud on their digital transformation journeys.

Researchers: NSO Group’s Pegasus Spyware Should Spark Bans, Apple Accountability


Our roundtable of experts weighs in on implications for Apple and lawmakers in the wake of the bombshell report showing widespread surveillance of dissidents, journalists and others. Malware Mobile Security Vulnerabilities