Top 5 reasons MSPs choose OpenText MDR Security It’s an exciting time to be a managed service provider… rooter December 9, 2024 5 min read 0
Lessons from the Field: How a Manufacturing Giant Transformed Its Security Posture Security The complexities of cybersecurity often seem insurmountable for large enterprises.… rooter December 9, 2024 1 min read 0
Anna Jaques Hospital Ransomware Breach Exposes Patient Data Security Ransomware attacks continue to disrupt industries worldwide, with healthcare remaining… rooter December 9, 2024 1 min read 0
Trust Issues in AI Security For a technology that seems startling in its modernity, AI… rooter December 9, 2024 7 min read 0
Weekly Update 429 Security Presently sponsored by: Cyberattacks are guaranteed. Is your recovery? Protect… rooter December 8, 2024 1 min read 0
Friday Squid Blogging: Safe Quick Undercarriage Immobilization Device Security Fifteen years ago I blogged about a different SQUID. Here’s… rooter December 6, 2024 2 min read 0
“Pwned”, The Book, Is Now Available for Free Security Presently sponsored by: Cyberattacks are guaranteed. Is your recovery? Protect… rooter December 6, 2024 2 min read 0
Detecting Pegasus Infections Security This tool seems to do a pretty good job. The… rooter December 6, 2024 1 min read 0
CVE-2014-2120: Ten-year-old Cisco ASA Flaw Exploited In The Wild Security First discovered in 2014 by researcher Jonathan Claudius, CVE-2014-2120 is… rooter December 5, 2024 1 min read 0
Protecting Against Bot-Enabled API Abuse Security APIs have become the backbone of modern digital ecosystems, powering… rooter December 4, 2024 6 min read 0