Security

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Don’t miss out on the opportunity to transform your organization’s approach to data security, privacy, and governance in the age of GenAI.

April 2, 2024 3 minutes read
What’s new in OpenText EnCase Endpoint Security 20.3

What’s new in OpenText EnCase Endpoint Security 20.3

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

September 28, 2020 3 minutes read
How to select the best remote access solutions in 2021

How to select the best remote access solutions in 2021

In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…

September 16, 2020 8 minutes read
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…

September 2, 2020 2 minutes read
Is social media being mined for insider threats?

Is social media being mined for insider threats?

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…

September 1, 2020 3 minutes read
How to treat employees like adults if they behave like children

How to treat employees like adults if they behave like children

In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…

August 26, 2020 5 minutes read
Remotely recovering digital evidence from off-network devices

Remotely recovering digital evidence from off-network devices

Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…

August 13, 2020 4 minutes read
What is secure remote access?

What is secure remote access?

If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew by an incredible 730% in…

August 11, 2020 10 minutes read
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over a myriad of sources—from desktops…

July 20, 2020 3 minutes read
NIST Privacy Framework – A focus on the identify function

NIST Privacy Framework – A focus on the identify function

Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…

July 14, 2020 5 minutes read
How cyber resilience supports the resilient organization

How cyber resilience supports the resilient organization

Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…

July 9, 2020 5 minutes read
No more searching through the haystack for City of Dallas

No more searching through the haystack for City of Dallas

For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation and HR investigations. Led by…

July 9, 2020 2 minutes read
How to select the best cyber resilience services in 2021

How to select the best cyber resilience services in 2021

So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference between cyber resilience and cyber…

June 29, 2020 8 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.