Security

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Don’t miss out on the opportunity to transform your organization’s approach to data security, privacy, and governance in the age of GenAI.

April 2, 2024 3 minutes read
The seven critical requirements for modern data collection

The seven critical requirements for modern data collection

In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment, investigations and eDiscovery: an increasingly…

October 2, 2020 4 minutes read
Modern data collection imperatives in today’s remote reality

Modern data collection imperatives in today’s remote reality

Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including an increasingly remote workforce. By…

October 2, 2020 3 minutes read
What’s new in OpenText EnCase Endpoint Security 20.3

What’s new in OpenText EnCase Endpoint Security 20.3

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

September 28, 2020 3 minutes read
How to select the best remote access solutions in 2021

How to select the best remote access solutions in 2021

In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…

September 16, 2020 8 minutes read
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…

September 2, 2020 2 minutes read
Is social media being mined for insider threats?

Is social media being mined for insider threats?

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…

September 1, 2020 3 minutes read
How to treat employees like adults if they behave like children

How to treat employees like adults if they behave like children

In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…

August 26, 2020 5 minutes read
Remotely recovering digital evidence from off-network devices

Remotely recovering digital evidence from off-network devices

Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…

August 13, 2020 4 minutes read
What is secure remote access?

What is secure remote access?

If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew by an incredible 730% in…

August 11, 2020 10 minutes read
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over a myriad of sources—from desktops…

July 20, 2020 3 minutes read
NIST Privacy Framework – A focus on the identify function

NIST Privacy Framework – A focus on the identify function

Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…

July 14, 2020 5 minutes read
How cyber resilience supports the resilient organization

How cyber resilience supports the resilient organization

Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…

July 9, 2020 5 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.