Line of Business

Building a threat hunting team

Building a threat hunting team

Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.

5 minute read

Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Given the critical nature of cybersecurity for industry sectors such as defense, healthcare, finance, and government, ensuring SIEM data sovereignty has never been more crucial….

5 minute read

Building trust in AI: Key strategies for data protection and ethical use 

Building trust in AI: Key strategies for data protection and ethical use 

Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it’s significantly changing the way businesses operate and thrive. AI tools are proving…

3 minute read

Make magic with integrated rich media in digital experience management

Make magic with integrated rich media in digital experience management

6 reasons to integrate DAM with your content management system

3 minute read

How to support threat hunters

How to support threat hunters

Threat hunting is a critical aspect of cybersecurity, involving the proactive search for threats and vulnerabilities within an organization’s network. For threat hunters to be effective, they need robust support from their managers and teams.

6 minute read

6 ways messaging supercharges mid-market financial services

6 ways messaging supercharges mid-market financial services

Fast, easy, personalized, and engaging experiences are the name of the game in financial services. It’s not just competitors you’re up against but also experience…

4 minute read

What’s New in Extended ECM for SAP SuccessFactors

What’s New in Extended ECM for SAP SuccessFactors

Release Update 24.3: The A, B, C of Advanced Features

3 minute read

How threat hunters stay informed and collaborate 

How threat hunters stay informed and collaborate 

In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. To do this, they need to stay informed and effectively collaborate.

6 minute read

Understanding threat hunter personas

Understanding threat hunter personas

Threat hunter personas bring the threat hunter to life and help communicate the important needs of threat hunters to the organizations that support them.

7 minute read

Embracing digital inclusivity

Embracing digital inclusivity

OpenText Document Accessibility and the European Accessibility Act 2025

4 minute read

OpenText Analytics Database: The ELT Advantage

OpenText Analytics Database: The ELT Advantage

Understand how OpenText Analytics Database (Vertica) revolutionizes data management by enhancing the ELT process, offering superior speed, scalability, and analytical power.

3 minute read

How many gold medals would your company win at the integration Olympics?

How many gold medals would your company win at the integration Olympics?

What do Olympic athletes and the world’s strongest companies have in common? A lot, it turns out. And the key is B2B integration.

7 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.