Security

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

July 23, 2024 5 minute read
Building a cyber resilient and safer world

Building a cyber resilient and safer world

Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must…

3 minute read

The growing need for digital forensic investigators

The growing need for digital forensic investigators

The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a…

5 minute read

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…

2 minute read

The superman of digital investigations

The superman of digital investigations

Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM Forensic and how it stacks…

6 minute read

Enabling Security Partners on MxDR Services

Enabling Security Partners on MxDR Services

OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…

2 minute read

Accelerating the pace of digital forensic investigations

Accelerating the pace of digital forensic investigations

Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster – in this case 33%…

4 minute read

Putting OpenText EnCase Forensic to the test

Putting OpenText EnCase Forensic to the test

They’re faster – fact or fiction? I was recently having a conversation with a customer at an industry forensics event. We were discussing what tools…

5 minute read

Maintaining heightened cyber safety during uncertain times

Maintaining heightened cyber safety during uncertain times

Situation overview Russia’s invasion of Ukraine is a prime example of one nation employing a combination of traditional weaponry and cyberattacks against another to disrupt…

4 minute read

Announcing OpenText Cloud Editions 22.1

Announcing OpenText Cloud Editions 22.1

The last two years have forced companies and organizations of all sizes to reassess their processes and operational methods and to change their mindset about…

6 minute read

Introducing Bricata Network Detection & Response

Introducing Bricata Network Detection & Response

Helping businesses and organizations keep operations in a trusted state  In today’s digital world, enterprises and organizations of all sizes have one thing in common…

4 minute read

White House directive shows threat detection and response integral to a zero trust strategy

White House directive shows threat detection and response integral to a zero trust strategy

The White House, on January 26, announced a new zero-trust strategy to harden cybersecurity across federal agencies.   Shalanda Young, Acting Director of the Office of…

5 minute read

Log4j vulnerability explained and how to respond

Log4j vulnerability explained and how to respond

On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.