Security
-
Catching threats in minutes, not days with OpenText MDR – Part 1
Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next…
Read more » -
Top 5 benefits of endpoint security software
Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition…
Read more » -
Three MDR strategies for government CISOs to quickly detect and respond to threats
The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that…
Read more » -
A day in the life of evidence: Part 2
Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and…
Read more » -
A day in the life of evidence: Part 1
Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police…
Read more » -
What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator
The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint…
Read more » -
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of…
Read more » -
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security…
Read more » -
JBS Ransomware attack highlights need for early detection and rapid response
Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these…
Read more » -
MITRE Engenuity’s ATT&CK R3
The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products…
Read more » -
Top 5 differences between information assurance vs. cybersecurity
There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information…
Read more » -
RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
Read more » -
Why information assurance and security is important in 2021
In March 2021, Chinese hackers broke into Microsoft Exchange Server and stole emails from over 250,000 customers worldwide. This raises…
Read more » -
Lessons from the SolarWinds attack: How to protect your business
By the time it was discovered in December, the SolarWinds cyber attack had evaded the security defenses of and penetrated…
Read more » -
The HAFNIUM Attack on the on-premises Microsoft Exchange Server
On March 2, Microsoft announced that its on-premises Exchange Server had experienced multiple 0-day exploits. Microsoft commented: “In the attacks…
Read more » -
Announcing OpenText Security and Protection Cloud CE 21.1
Large-scale cyberattacks have recorded a 5-fold increase during the pandemic. The recent SolarWinds breach, potentially the first of many such…
Read more » -
Achieving seamless eDiscovery
Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline…
Read more » -
Meeting the new challenges of digital evidence management
Dealing with the scale and complexity of evidence in rich-media formats (images, video and audio) is one of the key…
Read more » -
Announcing OpenText Security and Protection Cloud
2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. During the pandemic, there has…
Read more »