Security

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…

May 1, 2024 5 minutes read
Government must view ESG in 3D

Government must view ESG in 3D

Citizens today are becoming increasingly aware of how their actions and the actions of the organizations they work with affect the world around them—a trend…

June 28, 2023 5 minutes read
One, two, three…steps to improve your eDiscovery review database security

One, two, three…steps to improve your eDiscovery review database security

There are many good reasons to be proactive when it comes to securing our data everywhere it lives.  In legal matters, we go from legal…

June 12, 2023 5 minutes read
Recover your systems and data from disaster with confidence

Recover your systems and data from disaster with confidence

Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware or natural disaster – you’ll…

April 24, 2023 4 minutes read
Dissecting IcedID behavior on an infected endpoint

Dissecting IcedID behavior on an infected endpoint

IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…

March 30, 2023 4 minutes read
10 steps to combat the high cost of cyber insurance

10 steps to combat the high cost of cyber insurance

As the frequency and scope of cyberattacks increases, so does the cost of cyber insurance. And the rise is dramatic. As discussed in The Wall…

March 8, 2023 5 minutes read
The EnCase Evidence Viewer

The EnCase Evidence Viewer

OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market.  It has been the primary tool of choice for…

February 28, 2023 3 minutes read
Security Operations: Best Recent Reads

Security Operations: Best Recent Reads

To help shed light on SecOps and the issues surrounding it, this blog post offers a roundup of some of the most insightful content published in various corners of our site.

February 24, 2023 4 minutes read
Digital forensic device duplication – the next step

Digital forensic device duplication – the next step

Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and gathering evidence. This copy doesn’t…

February 17, 2023 3 minutes read
Simplify security through a scalable platform for MSPs and SMBs

Simplify security through a scalable platform for MSPs and SMBs

Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with the tools that make it…

February 16, 2023 3 minutes read
Protect your “anywhere” workforce from web-based threats

Protect your “anywhere” workforce from web-based threats

The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without secure, private, and visible control…

February 16, 2023 3 minutes read
Ride the digital ecosystem wave, securely

Ride the digital ecosystem wave, securely

Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses are eager to get their…

February 16, 2023 3 minutes read
Strengthen information protection with a Zero Trust Information Governance program

Strengthen information protection with a Zero Trust Information Governance program

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War…

February 2, 2023 2 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.