I’m asking you to give me 6 minutes of your time to read this. I promise it will be worth it. Allow me to start with this: According to Cybersecurity Insiders’ 2024 Insider Threat Report, 83% of organizations reported at least one insider …
However, while having Lookup Security to assign permissions to lookup tables is certainly a must-have, enabling Lookup Security after the upgrade has been implemented has proven to be a difficult and time-consuming process for DM …
People spend vast sums of money on personal security systems to protect themselves from a home invasion. Some even keep guns by their beds just in case a criminal breaks in while they are asleep. We visualize these bad actors as complete …
Name that Hack… Some background: Outside hackers sent thirty phishing emails and got one response, and as a result, the entire organization’s emails were compromised. The emails were then posted online, which created embarrassment and …
On June 3, 2017, the FBI arrested the contractor for allegedly removing classified documents from the National Security Agency in Georgia, and then mailing them to a news outlet. She is now the main suspect in the ensuing federal leak …
As self-driving car technology continues to improve, Uber stands to significantly reduce costs and improve margins by utilizing these advancements. The transportation company came onto the scene with such force that its very name became …
The full consequences for this breach have yet to be seen, but the sensitive information in these documents could very well end up in the hands of criminals or foreign spies, all because “former U.S. government hackers and contractors” …
But what about internal users that already have access? What happens when a trusted user becomes a malicious user? This question came up on a recent thread on the OpenText community message board. “The odds are if a user is downloading …
A recent blog post by OpenText, A Duty to Safeguard Client Content, underscores the ethical reasons and regulatory requirements that come into play. Author Sharon Malloch states, “The impact of a breach can be significant. And not just for …
The contractor is suspected of taking the highly classified “source code” developed by the agency to break into computer systems of adversaries like Russia, China, Iran and North Korea. Like Edward Snowden, this contractor was employed by …