Technologies

Why NDR is the latest 3-letter word in cybersecurity

Why NDR is the latest 3-letter word in cybersecurity

Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we…

October 28, 2022 5 minutes read
OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

October 28, 2022 4 minutes read
Climbing the world’s tallest mountain: Energy sustainability

Climbing the world’s tallest mountain: Energy sustainability

Hello from Alaska! I recently returned from an invigorating and inspiring OpenText World in Las Vegas earlier in October. Coming back to Alaska, I was…

October 27, 2022 4 minutes read
Modernization: Why AWS, Microsoft, and Google Have Placed Their Trust in Micro Focus

Modernization: Why AWS, Microsoft, and Google Have Placed Their Trust in Micro Focus

Large organizations are increasingly turning to Micro Focus to help modernize their valuable core IT applications, open avenues to continuous innovation and enable faster responses to dynamic changes in the market.

October 27, 2022 4 minutes read
Cut the noise. Cue the results.

Cut the noise. Cue the results.

If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have?  According to the latest report…

October 27, 2022 3 minutes read
Worth your time: Watch OpenText World 2022 on-demand

Worth your time: Watch OpenText World 2022 on-demand

Earlier this month, we brought together the best minds in information management at OpenText World 2022 in Las Vegas. Over three days, attendees explored more…

October 26, 2022 5 minutes read
The human dimension of cybercrime

The human dimension of cybercrime

It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions.  While traditional cybersecurity tactics focused…

October 26, 2022 4 minutes read
Curbing Insider Threats Today Requires a Holistic Approach 

Curbing Insider Threats Today Requires a Holistic Approach 

October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and…

October 19, 2022 5 minutes read
Trade more effectively by meeting global e-Invoicing requirements

Trade more effectively by meeting global e-Invoicing requirements

Today’s global manufacturers work with suppliers located around the world, many of which have their own distinct regulations for electronic invoicing (e‑Invoicing)—from archiving to digital…

October 19, 2022 3 minutes read
What is a customer information management system?

What is a customer information management system?

Modern work is changing how sales teams operate and how customers expect to interact with them. To achieve operational excellence, sales teams need a complete,…

October 18, 2022 4 minutes read
The future of fax matters

The future of fax matters

Fax in 2022? Why don’t you just send it over on a dinosaur! Or a carrier pigeon? Honestly, we’ve heard them all. But fax in…

October 18, 2022 5 minutes read
5 integration questions to answer before migrating to SAP S/4HANA 

5 integration questions to answer before migrating to SAP S/4HANA 

Migrating from older generation ERP systems to SAP S/4HANA offers great potential to improve operational performance and transform business processes. However, this major program doesn’t…

October 18, 2022 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.