OpenText Security Cloud Team
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…
A day in the life of evidence: Part 2
Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and detectives often have to access…
A day in the life of evidence: Part 1
Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police precincts contained large evidence rooms,…
What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator
The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator. Check out the latest…
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of resources to effectively detect and…
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products against emulated FIN7 and Carbanak threat tactics…
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information assurance and cybersecurity. Often these…
Why information assurance and security is important in 2021
In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises two questions: How do you…
Announcing OpenText Security and Protection Cloud CE 21.2
Forensic investigators and examiners are overwhelmed with the amount of evidence they must collect and examine, case logs are growing, and their investigative capacity is…
Announcing OpenText Security and Protection Cloud CE 21.1
Large-scale cyberattacks have recorded a 5-fold increase during the pandemic. The recent SolarWinds breach, potentially the first of many such attacks, is also among the…
Announcing OpenText Security and Protection Cloud
2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. During the pandemic, there has been a 5x increase in…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.