Security
-
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware…
Read more -
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial…
Read more -
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the…
Read more -
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and…
Read more -
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with…
Read more -
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without…
Read more -
Introducing the OpenText Tableau Forensic TD4 Duplicator
In today’s technology-centric world, more than 80% of the evidence collected in a criminal investigation includes the digital evidence contained…
Read more -
Ride the digital ecosystem wave, securely
Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses…
Read more -
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun…
Read more -
Smart PCAP: A time machine for the SOC
Anyone familiar with packet forensics or packet recording knows you can spend hours poring over bulk information and waiting for…
Read more -
What we can learn from the ACC 2022 State of Cybersecurity Report
Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of…
Read more -
A good foundation is key to digital forensic investigations
I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When…
Read more -
Top 10 network security best practices
Network security is constantly evolving. To stay ahead of bad actors, follow these 10 best practices to reduce the risk…
Read more -
OpenText is a leader in Detection and Response
MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with…
Read more -
Technology meets tenacity
Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your…
Read more -
OpenText MxDR platform: a team player
There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack…
Read more -
Stopping threats cold
Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or…
Read more -
Why NDR is the latest 3-letter word in cybersecurity
Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and…
Read more -
OpenText MxDR Platform: By the numbers
There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one. Data protection and threat…
Read more