News, Insight and Analysis
News
-
Europol 'targets' 12 suspects in ransomware bust
Europol has not said whether the suspected ransomware actors were arrested or detained, but the 12 were allegedly involved in attacks that affected 1,800 victims in 71 countries. Continue Reading
-
Risk & Repeat: Apple bug bounty frustrations boil over
Security researchers criticized the Apple Security Bounty program and claimed the company ignored bug reports, denied bounty payments and silently patched vulnerabilities. Continue Reading
-
Cyber insurance premiums, costs skyrocket as attacks surge
As cyber attacks and losses have increased, so has demand for cyber insurance. But now premiums are reflecting a harsh new reality. Continue Reading
-
FireEye and McAfee Enterprise announce product mashup
Merger-happy investment firm STG has let slip that it will integrate the product lines of McAfee Enterprise and FireEye. Analysts say it will be a challenging road ahead. Continue Reading
-
Group-IB CEO Ilya Sachkov charged with treason in Russia
Group-IB maintains the innocence of CEO and founder Ilya Sachkov and said that co-founder and CTO Dmitry Volkov will assume leadership of the company. Continue Reading
Get Started
-
22 free cybersecurity tools you should know about
Cybersecurity products can get pricy, but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular. Continue Reading
-
Enterprise search vs. federated search: Which to choose?
Enterprise and federated search help employees find content. However, enterprise search retrieves internal data, whereas a federated approach pulls results from external sources. Continue Reading
-
How to create a remote access policy, with template
Remote work, while beneficial, presents numerous security risks. Help keep your organization's systems safe with a remote access policy. Continue Reading
-
How to write a winning RFP response
Sales teams face constant pressure to write winning RFP responses. Best practices, such as personalizing responses, can help them stand out from competitors. Continue Reading
-
How to choose the right document management system
With numerous options to peruse, picking the right document management system requires a careful examination of its tools and features. Continue Reading
Evaluate
-
How to choose the best Markdown editor: A 9-tool comparison
A dedicated authoring tool helps writers take full advantage of Markdown. Find one that supports your development projects, documentation tasks or even daily writing objectives. Continue Reading
-
Why is document version control important?
Although best practices have changed, many organizations lack a suitable versioning strategy. Proper document version control can improve collaboration and fact-checking. Continue Reading
-
Top 10 document management software in 2025
Many organizations require document management software that can automate workflows, support remote access and maintain compliance. Top systems include Box and SharePoint Online. Continue Reading
-
8 examples of document version control
Document version control can help organizations improve their content management strategies if they choose the right approach, like labeling copies and purging old drafts. Continue Reading
-
Ransomware payments: Considerations before paying
To pay or not to pay -- that's the question after a ransomware attack. Law enforcement recommends against it, but that doesn't stop some companies from paying up. Continue Reading
Manage
-
8 Drupal security best practices
Drupal offers advanced security features, but admins must know how to implement and configure them. Best practices include using the latest version and backing up sites. Continue Reading
-
10 cybersecurity best practices for organizations in 2025
To improve your organization's cybersecurity program, follow these best practices to safeguard your infrastructure and ensure a quick recovery after a breach. Continue Reading
-
10 key cybersecurity metrics and KPIs your board wants tracked
Security leaders need cybersecurity metrics to track their programs and inform decision-makers. These 10 metrics and KPIs provide a good foundation for tracking essential activity. Continue Reading
-
What is a compliance audit? (with an example checklist)
A compliance audit is critical for finding any potential compliance gaps in an organization's operations. Here's what companies can do to prepare for them. Continue Reading
-
How Microsoft uses AI for RFP response management
Microsoft's proposal team implemented Responsive's GenAI tool to automate RFP responses. The tool can quickly create first drafts, but it still requires human editing. Continue Reading
Problem Solve
-
Enterprise cybersecurity hygiene checklist for 2025
Enterprise cybersecurity hygiene must be a shared responsibility between employees and employers. Learn how both can get the job done with this checklist. Continue Reading
-
Top 12 business intelligence challenges to manage
BI teams face various technical and project management challenges on deployments. Here are the top BI challenges, with advice on how to address them. Continue Reading
-
5 SharePoint migration challenges and how to overcome them
A move to SharePoint Online from a legacy system can help organizations modernize their ECM strategies. Yet, customizations and poor planning often hinder implementation. Continue Reading
-
7 supply chain resilience strategies to use now
Weather events, geopolitical unrest and other disruptions are occurring more frequently. These seven supply chain resilience techniques can help manage them. Continue Reading
-
6 challenges of omnichannel marketing
When marketers use omnichannel strategies to engage customers across touchpoints, they often face challenges with personalization, campaign tracking and brand consistency. Continue Reading