News
Building a threat hunting team
Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.
Building trust in AI: Key strategies for data protection and ethical use
Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it’s significantly changing the way businesses operate and thrive. AI tools are proving…
• 3 minute read
How threat hunters stay informed and collaborate
In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. To do this, they need to stay informed and effectively collaborate.
• 6 minute read
IDC MarketScape names OpenText a leader in intelligent digital asset management
Digital asset management systems have rapidly evolved
• 2 minute read
Understanding threat hunter personas
Threat hunter personas bring the threat hunter to life and help communicate the important needs of threat hunters to the organizations that support them.
• 7 minute read
OpenText Analytics Database: The ELT Advantage
Understand how OpenText Analytics Database (Vertica) revolutionizes data management by enhancing the ELT process, offering superior speed, scalability, and analytical power.
• 3 minute read
Information reimagined for the energy industry
The global race for energy will require elevating the human potential across the entire industry
• 3 minute read
Harnessing the Power of ELT for Real-Time Data Processing
Explore the capabilities of ELT (Extract, Load, Transform) in managing and processing real-time data, transforming the way businesses leverage instant analytics for decision-making.
• 2 minute read
Top three challenges of threat hunting
Our series on threat hunters has covered what they are and what they do. This week’s post highlights two common mistakes threat hunters make and…
• 5 minute read
How to decide between ETL and ELT for data management needs
Navigating the decision between ETL and ELT can be complex. Discover the factors that influence this choice and how to select the best approach for your data strategy.
• 2 minute read
Threat hunters – A day in the life
Threat hunting is not just a job; it’s a commitment to staying one step ahead of cyber adversaries. In this post, we’ll dive into the…
• 6 minute read
Raise the Bar on Your Software Delivery Game: OpenText’s DevSecOps MVPs Take the Gold
It’s time to level up your software delivery game with OpenText’s DevSecOps dream team.
• 5 minute read
Three key aspects of being a threat hunter
In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…
• 5 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.