Security
-
To do, know and be… ask, why not me!
Authored by Maureen Kaplan, VP Sales, OpenText Security It was the response to her childhood ‘declarations of I can’t’ that changed…
Read more » -
Boost your digital fitness for cyber resilience in 2020 – and beyond
During this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by…
Read more » -
Announcing OpenText Security and Protection Cloud
2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. During the pandemic, there has…
Read more » -
A little knowledge can be a dangerous thing…
In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from less. Every action we take leaves a…
Read more » -
How to protect remote workers against today’s threats
The current global situation has necessitated the immediate shift to remote work. It’s estimated that 42% of the workforce now works at home, which…
Read more » -
The seven critical requirements for modern data collection
In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment,…
Read more » -
Modern data collection imperatives in today’s remote reality
Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including…
Read more » -
What’s new in OpenText EnCase Endpoint Security 20.3
As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security…
Read more » -
How to select the best remote access solutions in 2021
In our last blog we took a look at what is secure remote access. All the signs suggest that as…
Read more » -
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3
OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the…
Read more » -
Is social media being mined for insider threats?
This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in…
Read more » -
How to treat employees like adults if they behave like children
In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers.…
Read more » -
Remotely recovering digital evidence from off-network devices
Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical…
Read more » -
What is secure remote access?
If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew…
Read more » -
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3
Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over…
Read more » -
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data…
Read more » -
How cyber resilience supports the resilient organization
Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink…
Read more » -
No more searching through the haystack for City of Dallas
For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation…
Read more » -
How to select the best cyber resilience services in 2021
So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference…
Read more » -
Building trust in an era of constant threats
Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones…
Read more »