Cyber Resilience
-
The growing need for digital forensic investigators
The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet…
Read more » -
Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint
Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has…
Read more » -
The superman of digital investigations
Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM…
Read more » -
Enabling Security Partners on MxDR Services
OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information…
Read more » -
Accelerating the pace of digital forensic investigations
Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster…
Read more » -
Putting OpenText EnCase Forensic to the test
They’re faster – fact or fiction? I was recently having a conversation with a customer at an industry forensics event.…
Read more » -
Catching threats in minutes, not days with OpenText MDR – Part 2
We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations,…
Read more » -
Announcing OpenText Security & Protection Cloud CE 21.4
With OpenText™ Cloud Editions (CE) 21.4, OpenText is pleased to bring to market additional capabilities and offerings aimed at making the world…
Read more » -
#BeCyberSmart: Detect forensically and respond rapidly
October is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a…
Read more » -
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute…
Read more » -
Catching threats in minutes, not days with OpenText MDR – Part 1
Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next…
Read more » -
Top 5 benefits of endpoint security software
Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition…
Read more » -
Three MDR strategies for government CISOs to quickly detect and respond to threats
The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that…
Read more » -
An integrative approach to managing data privacy
Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research,…
Read more » -
A day in the life of evidence: Part 2
Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and…
Read more » -
A day in the life of evidence: Part 1
Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police…
Read more » -
Modern viewing and collaboration for the secure remote workforce
Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to…
Read more » -
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of…
Read more » -
Kaseya VSA Zero-Day Supply Chain Ransomware Attack
Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July…
Read more » -
How to select the best endpoint security solutions in 2021
The thought that a chain is only as strong as its weakest link is something that can keep IT security…
Read more »