Security
Unlocking AI potential for CISOs: A framework for safe adoption
Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…
Obtaining a bearer token to enable API interaction
OpenText™ Network Detection & Response (NDR), previously known as Bricata Network Detection & Response, provides real-time network visibility, metadata generation and threat detection. Additionally, it…
To upgrade, or not to upgrade…that is the question for enterprise software users
Upgrading a major software application can be challenging. Many factors come into play, including budget issues, downtime, upskilling the staff, and addressing software and automation…
Government must view ESG in 3D
Citizens today are becoming increasingly aware of how their actions and the actions of the organizations they work with affect the world around them—a trend…
One, two, three…steps to improve your eDiscovery review database security
There are many good reasons to be proactive when it comes to securing our data everywhere it lives. In legal matters, we go from legal…
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware or natural disaster – you’ll…
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…
10 steps to combat the high cost of cyber insurance
As the frequency and scope of cyberattacks increases, so does the cost of cyber insurance. And the rise is dramatic. As discussed in The Wall…
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the primary tool of choice for…
Security Operations: Best Recent Reads
To help shed light on SecOps and the issues surrounding it, this blog post offers a roundup of some of the most insightful content published in various corners of our site.
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and gathering evidence. This copy doesn’t…
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with the tools that make it…
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without secure, private, and visible control…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.