Blog

337 articles

Digital Transformation Begins Where Legacy Software Ends

Digital Transformation Begins Where Legacy Software Ends | https://ed.gr/c7jns “That’s why digital transformation begins where legacy software ends — because at some point, you need to break those eggs so that you can move on with the rest of what is to come.” Digital Transformation Begins Where Legacy Software Ends Source

Read More

Real World Information Management Use Case: Identifying Internal Breaches

Real World Information Management Use Case: Identifying Internal Breaches | https://ed.gr/c7n9h “But if you don’t have a system in place to wipe those machines and remove access if an employee leaves — or if that device should happen to be lost or stolen — you have a potentially massive vulnerability on your hands just waiting […]

Read More

Cyber News Rundown Week of Nov 5th | Webroot Community

The week’s biggest #infosec stories: 🇬🇧 The British Labour Party suffered a #databreach 🏫 More than 800 South Carolina school computers were hit with a cyberattack 🕵️ The infamous BlackMatter #ransomware group appears to be deactivating https://wbrt.io/3H0qJpZ Cyber News Rundown Week of Nov 5th | Webroot Community Source

Read More