information security
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War…
Why should governments take an AI-based approach to information security?
Every day, intra- and cross-functional government teams exchange diverse datasets to achieve their citizen-centric missions. The approach to this information exchange could be a proactive…
Announcing OpenText Content Cloud CE 21.1
Recent changes in work habits are quickly becoming the new standard, with our customers telling us practices such as remote work and dispersed process management…
Announcing OpenText Developer Cloud CE 21.1
At OpenText™, we take information security very seriously. So, it should come as no surprise that security is a key improvement as we continually improve…
How to select the best remote access solutions in 2021
In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…
Be cyber resilient and prepare for an attack
Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…
The lawyer’s growing role in cybersecurity
Managing sensitive legal information has always been complex. Today, it’s more complicated than ever with the rise in cybersecurity threats, volume of information and new…
Decide the future of your enterprise with OT2
At OpenText™ Enterprise World 2018, we announced the availability of OpenText OT2, the next-generation hybrid-cloud platform that brings together intelligent automation, security, and EIM applications…
Security is Job 1
Businesses are operating in a zero-trust environment. Every year, the World Economic Forum releases its Global Risks Report to identify and analyze the most pressing…
OpenText Enfuse® 2018
Information rules the world, and technology like EIM, AI, Robots, and IoT are transforming business on a planetary scale. At the same time, cybercrime and…
5 Critical Questions You Need to Ask About Your Sensitive Data
Data privacy regulations, interconnectivity (virtual machines, cloud, IoT, BYOD), and cyber threats are changing the global digital landscape. With this transformation comes inherent risk, and…
Turn regulatory compliance into competitive advantage
For many, the new year is a time for new beginnings, new habits, and new ways of thinking. When the calendar flipped to 2018, I…
The Future of Information: OpenText Release 16 – Robust Information Security
As the economy moves online, businesses are become more vulnerable to cyberattacks. The list of casualties grows every day, with big names falling victim to…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.