Security

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity 

The attack on Change Healthcare is a pivotal moment for healthcare cybersecurity.

March 21, 2024 3 minutes read
Log4j vulnerability explained and how to respond

Log4j vulnerability explained and how to respond

On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it…

December 22, 2021 4 minutes read
Catching threats in minutes, not days with OpenText MDR – Part 2

Catching threats in minutes, not days with OpenText MDR – Part 2

We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations, OpenText, and Kevin Golas, Director…

December 10, 2021 5 minutes read
Introducing OpenText EnCase Incident Response

Introducing OpenText EnCase Incident Response

Corporations are facing constant cybersecurity threats. They need to be able to respond by quickly and proactively conducting investigations that can identify a potential threat….

November 23, 2021 2 minutes read
Introducing OpenText Digital Evidence Center

Introducing OpenText Digital Evidence Center

Imagine this. You’re a large police force for a major metropolitan city. You investigate thousands of cases a year.  In these investigations, officers and investigators collect mountains…

November 22, 2021 4 minutes read
Announcing OpenText Security & Protection Cloud CE 21.4

Announcing OpenText Security & Protection Cloud CE 21.4

With OpenText™ Cloud Editions (CE) 21.4, OpenText is pleased to bring to market additional capabilities and offerings aimed at making the world a safer, more secure place…

November 16, 2021 3 minutes read
De-risk your cybersecurity program

De-risk your cybersecurity program

Cyber resilience is no longer optional, it is an essential component of Information Management to protect the most valuable assets: data and business processes. Effective…

November 15, 2021 2 minutes read
#BeCyberSmart: Detect forensically and respond rapidly

#BeCyberSmart: Detect forensically and respond rapidly

October is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our…

October 14, 2021 4 minutes read
Machine learning in cybersecurity

Machine learning in cybersecurity

Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…

October 11, 2021 5 minutes read
Catching threats in minutes, not days with OpenText MDR – Part 1

Catching threats in minutes, not days with OpenText MDR – Part 1

Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next opportunity. In many cases, they…

September 28, 2021 6 minutes read
Top 5 benefits of endpoint security software

Top 5 benefits of endpoint security software

Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition to user devices – such…

September 21, 2021 9 minutes read
Three MDR strategies for government CISOs to quickly detect and respond to threats

Three MDR strategies for government CISOs to quickly detect and respond to threats

The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the…

September 8, 2021 4 minutes read
An integrative approach to managing data privacy

An integrative approach to managing data privacy

Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research, I was excited to learn…

August 31, 2021 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.