Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War…
• 2 minute read
Smart PCAP: A time machine for the SOC
Anyone familiar with packet forensics or packet recording knows you can spend hours poring over bulk information and waiting for a response. With Smart PCAP,…
• 4 minute read
What we can learn from the ACC 2022 State of Cybersecurity Report
Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of Cybersecurity Report, An In-house Perspective….
• 6 minute read
A good foundation is key to digital forensic investigations
I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When we build a house, we…
• 4 minute read
G before S except after E and other rules to live by
2022 was both chaotic and transformative – a war in Ukraine, increased cyber-attacks, disrupted supply chains, an adjustment to work at home and new trust…
• 5 minute read
Top 10 network security best practices
Network security is constantly evolving. To stay ahead of bad actors, follow these 10 best practices to reduce the risk of data compromise. 1. Review…
• 5 minute read
OpenText is a leader in Detection and Response
MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its…
• 3 minute read
Technology meets tenacity
Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…
• 4 minute read
OpenText MxDR platform: a team player
There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…
• 3 minute read
Stopping threats cold
Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…
• 4 minute read
Why NDR is the latest 3-letter word in cybersecurity
Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we…
• 5 minute read
OpenText MxDR Platform: By the numbers
There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one. Data protection and threat remediation are like that, too….
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up