Security
The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity
The attack on Change Healthcare is a pivotal moment for healthcare cybersecurity.
Log4j vulnerability explained and how to respond
On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it…
Catching threats in minutes, not days with OpenText MDR – Part 2
We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations, OpenText, and Kevin Golas, Director…
Introducing OpenText EnCase Incident Response
Corporations are facing constant cybersecurity threats. They need to be able to respond by quickly and proactively conducting investigations that can identify a potential threat….
Introducing OpenText Digital Evidence Center
Imagine this. You’re a large police force for a major metropolitan city. You investigate thousands of cases a year. In these investigations, officers and investigators collect mountains…
Announcing OpenText Security & Protection Cloud CE 21.4
With OpenText™ Cloud Editions (CE) 21.4, OpenText is pleased to bring to market additional capabilities and offerings aimed at making the world a safer, more secure place…
De-risk your cybersecurity program
Cyber resilience is no longer optional, it is an essential component of Information Management to protect the most valuable assets: data and business processes. Effective…
#BeCyberSmart: Detect forensically and respond rapidly
October is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a subject I believe is our…
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…
Catching threats in minutes, not days with OpenText MDR – Part 1
Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next opportunity. In many cases, they…
Top 5 benefits of endpoint security software
Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition to user devices – such…
Three MDR strategies for government CISOs to quickly detect and respond to threats
The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the…
An integrative approach to managing data privacy
Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research, I was excited to learn…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.