Security
Three key aspects of being a threat hunter
In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…
![Building a cyber resilient and safer world](https://blogs.opentext.com/wp-content/uploads/2022/05/OTW-EMEA-2022-Blog-Generic-1200x675-C-V3-8-1-341x192.jpg)
Building a cyber resilient and safer world
Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must…
• 3 minute read
![The growing need for digital forensic investigators](https://blogs.opentext.com/wp-content/uploads/2022/04/shutterstock_218038963-1200x675-1-341x192.jpg)
The growing need for digital forensic investigators
The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a…
• 5 minute read
![Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint](https://blogs.opentext.com/wp-content/uploads/2022/04/shutterstock_1356335729-1200x675-1-341x192.jpg)
Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint
Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…
• 2 minute read
![The superman of digital investigations](https://blogs.opentext.com/wp-content/uploads/2022/03/shutterstock_1493123198-1200x675-1-341x192.jpg)
The superman of digital investigations
Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM Forensic and how it stacks…
• 6 minute read
![Enabling Security Partners on MxDR Services](https://blogs.opentext.com/wp-content/uploads/2022/04/shutterstock_587145293-1200x675-1-341x192.jpg)
Enabling Security Partners on MxDR Services
OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…
• 2 minute read
![Accelerating the pace of digital forensic investigations](https://blogs.opentext.com/wp-content/uploads/2022/03/shutterstock_1334759021-1200x675-2-341x192.jpg)
Accelerating the pace of digital forensic investigations
Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster – in this case 33%…
• 4 minute read
![Putting OpenText EnCase Forensic to the test](https://blogs.opentext.com/wp-content/uploads/2022/02/shutterstock_1232797123-1200x675-1-341x192.jpg)
Putting OpenText EnCase Forensic to the test
They’re faster – fact or fiction? I was recently having a conversation with a customer at an industry forensics event. We were discussing what tools…
• 5 minute read
![Maintaining heightened cyber safety during uncertain times](https://blogs.opentext.com/wp-content/uploads/2022/03/shutterstock_1834912495-1200x675-1-341x192.jpg)
Maintaining heightened cyber safety during uncertain times
Situation overview Russia’s invasion of Ukraine is a prime example of one nation employing a combination of traditional weaponry and cyberattacks against another to disrupt…
• 4 minute read
![Announcing OpenText Cloud Editions 22.1](https://blogs.opentext.com/wp-content/uploads/2022/02/GettyImages-932149644-1200x675-1-341x192.jpg)
Announcing OpenText Cloud Editions 22.1
The last two years have forced companies and organizations of all sizes to reassess their processes and operational methods and to change their mindset about…
• 6 minute read
![Introducing Bricata Network Detection & Response](https://blogs.opentext.com/wp-content/uploads/2022/02/shutterstock_1388410394-1200x675-1-341x192.jpg)
Introducing Bricata Network Detection & Response
Helping businesses and organizations keep operations in a trusted state In today’s digital world, enterprises and organizations of all sizes have one thing in common…
• 4 minute read
![White House directive shows threat detection and response integral to a zero trust strategy](https://blogs.opentext.com/wp-content/uploads/2022/02/shutterstock_1116133277-1200x675-1-341x192.jpg)
White House directive shows threat detection and response integral to a zero trust strategy
The White House, on January 26, announced a new zero-trust strategy to harden cybersecurity across federal agencies. Shalanda Young, Acting Director of the Office of…
• 5 minute read
![Log4j vulnerability explained and how to respond](https://blogs.opentext.com/wp-content/uploads/2021/12/Blog-Image-Option-02-1200x650-1-341x192.jpg)
Log4j vulnerability explained and how to respond
On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.