Security
-
7 key things forensic investigators need to do
Law enforcement, government agencies and corporate enterprises alike count on their digital forensic technology to keep evolving alongside their growing…
Read more » -
Announcing OpenText Content Services 16 EP4
The adoption and consumption of content services are fueling advances in automation and integration. Together, they’re changing the way we…
Read more » -
Integration and automation let cybersecurity teams do more with less
OpenText™ EnCase™ Endpoint Security 6.04 is the newest release of our leading endpoint detection and response (EDR) solution. With the…
Read more » -
5 Critical Questions You Need to Ask About Your Sensitive Data
Data privacy regulations, interconnectivity (virtual machines, cloud, IoT, BYOD), and cyber threats are changing the global digital landscape. With this…
Read more » -
IT modernization in Government
IT modernization has always been high on the agenda of government CIOs. Following the Modernizing Government Technology Act becoming law,…
Read more » -
Traditional records management isn’t working for government – or anybody else
Government agencies at all levels are realizing traditional records management practices are insufficient and ineffective in a digital world. Why?…
Read more » -
Key factors in endpoint threat detection
2017 was a year of massive data breaches – organizations like Equifax, Uber, Deloitte, Forever 21, OneLogin, Verizon, and Arby’s…
Read more » -
Connected device data exchange – who’s minding the store on security?
The OpenText™ Business Network blog post Top Ten Supply Chain Predictions for 2018, prediction #9 Augmented Reality Technology — talks…
Read more » -
GDPR – stop delaying, it’s time to get to work
In the regulatory compliance world, a lot has been written over the past two years introducing organizations to the new…
Read more » -
Turn regulatory compliance into competitive advantage
For many, the new year is a time for new beginnings, new habits, and new ways of thinking. When the…
Read more » -
Ten things impacting the world: the nature of conflict
In 2010, a malicious virus known as Stuxnet destroyed nearly 1,000 centrifuges in an Iranian uranium enrichment facility. The cyberattack…
Read more » -
Viewing and collaborating on files doesn’t have to be painful!
Do any of the following scenarios sound familiar? The impossible-to-open file Your manager sends you a file (in email, of…
Read more » -
Navigating the identity game for digital transformation
In a world of interconnected people, systems and things, identity and access management (IAM) is a fast-paced game of managing…
Read more » -
Understanding the Nature of Cyberattacks
In order to fight cyberattacks, enterprises must first be able to detect them. Hackers and cybercriminals go to great lengths…
Read more » -
Announcing…The First Cloud Fax Solution Built Specifically for Healthcare
Faxing remains one of the top methods of patient information exchange in healthcare. Despite this dominance, healthcare providers continue to…
Read more »