Security

Machine vs. machine

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….

April 19, 2024 4 minutes read
A good foundation is key to digital forensic investigations

A good foundation is key to digital forensic investigations

I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When we build a house, we…

January 18, 2023 4 minutes read
G before S except after E and other rules to live by

G before S except after E and other rules to live by

2022 was both chaotic and transformative – a war in Ukraine, increased cyber-attacks, disrupted supply chains, an adjustment to work at home and new trust…

January 13, 2023 5 minutes read
Top 10 network security best practices

Top 10 network security best practices

Network security is constantly evolving. To stay ahead of bad actors, follow these 10 best practices to reduce the risk of data compromise.  1. Review…

January 10, 2023 5 minutes read
OpenText is a leader in Detection and Response

OpenText is a leader in Detection and Response

MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its…

November 9, 2022 3 minutes read
Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

November 3, 2022 4 minutes read
OpenText MxDR platform: a team player

OpenText MxDR platform: a team player

There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…

November 1, 2022 3 minutes read
Stopping threats cold

Stopping threats cold

Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…

October 31, 2022 4 minutes read
Why NDR is the latest 3-letter word in cybersecurity

Why NDR is the latest 3-letter word in cybersecurity

Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we…

October 28, 2022 5 minutes read
OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

October 28, 2022 4 minutes read
Cut the noise. Cue the results.

Cut the noise. Cue the results.

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have?  According to the latest report…

October 27, 2022 3 minutes read
The human dimension of cybercrime

The human dimension of cybercrime

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.  While traditional cybersecurity tactics focused…

October 26, 2022 4 minutes read
Apple property list parsing with EnScript

Apple property list parsing with EnScript

The third blog in the series following on from Using the Generic SQLite Database Parser EnScript in forensic examination of a mobile device, will focus…

October 6, 2022 6 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.