Security

OpenText™ Cybersecurity 2024 Global Ransomware Survey: Supply chain and AI-powered attack fears intensify

In the third annual OpenText™ Cybersecurity 2024 Global Ransomware Survey, we put a magnifying glass to these growing attack techniques and vectors.

October 10, 2024 5 minute read
Series wrap – The rise of the threat hunter

Series wrap – The rise of the threat hunter

As we reach the conclusion of the Threat Hunters blog series, it’s clear that the role of these cybersecurity specialists has never been more important.

6 minute read

OpenText Threat Intelligence™ (BrightCloud): Empowering proactive cyber defense 

OpenText Threat Intelligence™ (BrightCloud): Empowering proactive cyber defense 

In today’s rapidly evolving, AI-driven cybersecurity landscape, threats are growing more sophisticated by the day. To stay ahead of the curve—whether you are a networking,…

5 minute read

Transform threat hunting with actionable threat intelligence

Transform threat hunting with actionable threat intelligence

One of the most valuable assets in a threat hunter’s toolkit is threat intelligence, a resource that enriches their efforts by providing data, context, and insights into emerging cyber threats. 

6 minute read

2024 threat hunter perspectives: Key insights from OpenText’s latest report

2024 threat hunter perspectives: Key insights from OpenText’s latest report

In today’s evolving threat landscape, cyber defenders are constantly adapting to new adversarial tactics and emerging vulnerabilities.

4 minute read

Auto-remediation: the future of AppSec?

Auto-remediation: the future of AppSec?

Understand the limits of auto-remediation in securing applications.

9 minute read

Equipping threat hunters: Advanced analytics and AI – Part 2

Equipping threat hunters: Advanced analytics and AI – Part 2

If you work in the field of cybersecurity, you cannot ignore the warning sign of any imminent threats. New cyberthreats, adversaries, and hacking tools emerge…

7 minute read

Equipping threat hunters: Advanced analytics and AI part 1

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

6 minute read

DevSecOps: It’s Time to Level Up (with a Little Help from AI) 

DevSecOps: It’s Time to Level Up (with a Little Help from AI) 

On Sept 24, we’re not just talking about the future – we’re building it. We’re diving into how AI is turbocharging DevSecOps, making it faster, smarter, and more secure.

3 minute read

FedRAMP® Authorized: OpenText Solutions Help Government Agencies Achieve Mission-Critical Objectives

FedRAMP® Authorized: OpenText Solutions Help Government Agencies Achieve Mission-Critical Objectives

OpenText is one of the few companies that offers a wide range of FedRAMP authorized cloud services and products to meet the diverse information management needs of federal, state, and local government agencies.

8 minute read

The future of threat hunting 

The future of threat hunting 

In the near future, we’ll face a cyber landscape transformed by artificial intelligence. Attacks will become exponentially more sophisticated, evasive, and pervasive. Threat actors will…

4 minute read

Building a threat hunting team

Building a threat hunting team

Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.

5 minute read

Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Given the critical nature of cybersecurity for industry sectors such as defense, healthcare, finance, and government, ensuring SIEM data sovereignty has never been more crucial….

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up