Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
DevSecOps: It’s Time to Level Up (with a Little Help from AI)
On Sept 24, we’re not just talking about the future – we’re building it. We’re diving into how AI is turbocharging DevSecOps, making it faster, smarter, and more secure.
• 3 minute read
FedRAMP® Authorized: OpenText Solutions Help Government Agencies Achieve Mission-Critical Objectives
OpenText is one of the few companies that offers a wide range of FedRAMP authorized cloud services and products to meet the diverse information management needs of federal, state, and local government agencies.
• 8 minute read
The future of threat hunting
In the near future, we’ll face a cyber landscape transformed by artificial intelligence. Attacks will become exponentially more sophisticated, evasive, and pervasive. Threat actors will…
• 4 minute read
Building a threat hunting team
Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.
• 5 minute read
Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM
Given the critical nature of cybersecurity for industry sectors such as defense, healthcare, finance, and government, ensuring SIEM data sovereignty has never been more crucial….
• 5 minute read
Building trust in AI: Key strategies for data protection and ethical use
Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it’s significantly changing the way businesses operate and thrive. AI tools are proving…
• 3 minute read
How to support threat hunters
Threat hunting is a critical aspect of cybersecurity, involving the proactive search for threats and vulnerabilities within an organization’s network. For threat hunters to be effective, they need robust support from their managers and teams.
• 6 minute read
How threat hunters stay informed and collaborate
In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. To do this, they need to stay informed and effectively collaborate.
• 6 minute read
Understanding threat hunter personas
Threat hunter personas bring the threat hunter to life and help communicate the important needs of threat hunters to the organizations that support them.
• 7 minute read
Top three challenges of threat hunting
Our series on threat hunters has covered what they are and what they do. This week’s post highlights two common mistakes threat hunters make and…
• 5 minute read
Threat hunters – A day in the life
Threat hunting is not just a job; it’s a commitment to staying one step ahead of cyber adversaries. In this post, we’ll dive into the…
• 6 minute read
Three key aspects of being a threat hunter
In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…
• 5 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up