Security
-
An integrative approach to managing data privacy
Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research,…
Read more -
A day in the life of evidence: Part 2
Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and…
Read more -
A day in the life of evidence: Part 1
Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police…
Read more -
What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator
The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint…
Read more -
Modern viewing and collaboration for the secure remote workforce
Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to…
Read more -
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of…
Read more -
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July…
Read more -
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security…
Read more -
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these…
Read more -
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products…
Read more -
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information…
Read more -
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more -
5 leadership lessons from the pandemic
Every area of business has faced its own challenges over the past 15 months—from sales and marketing, to customer support and product development. On top of all that, cyber threats have grown as criminals…
Read more -
Addressing cyber resilience gaps across key infrastructure assets
The ransomware attack on Colonial Pipeline was yet another wake up call for critical infrastructure and supply chains to rethink their approach…
Read more -
4 reasons why technology is vital—during and after ‘unprecedented’ times
Organizations rely on information to anticipate trends, take advantage of new opportunities, and succeed in today’s world. As organizations around…
Read more -
Banks are fighting a multi-front war on fraud
According to S&P Global, the COVID-19 pandemic caused a “perfect storm” for financial services companies, which witnessed a 238 percent…
Read more -
Why information assurance and security is important in 2021
In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises…
Read more -
Security in the healthcare spotlight
One of the most significant priorities facing healthcare in 2021 is the need for improved security. The rapid move to…
Read more -
Lessons from the SolarWinds attack: How to protect your business
By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated…
Read more