Security

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

May 10, 2024 8 minute read
Unlocking AI potential for CISOs: A framework for safe adoption

Unlocking AI potential for CISOs: A framework for safe adoption

Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…

7 minute read

The new wave of channel marketing: What partners can expect in H2 2024

The new wave of channel marketing: What partners can expect in H2 2024

We’re well into 2024 now and the channel marketing landscape continues to change, thanks to a blend of innovation and connectivity. At OpenText™, we’re not…

5 minute read

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…

5 minute read

Machine vs. machine

Machine vs. machine

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….

4 minute read

Elevate human potential with Cloud Editions (CE) 24.2

Elevate human potential with Cloud Editions (CE) 24.2

Latest innovations revealed at OpenText World Europe 2024

10 minute read

Transforming digital forensic investigations

Transforming digital forensic investigations

In the modern landscape of digital forensics, investigators must navigate many challenges stemming from the exponential growth of digital data.

4 minute read

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Don’t miss out on the opportunity to transform your organization’s approach to data security, privacy, and governance in the age of GenAI.

3 minute read

Cybersecurity Services combat an APT with NDR

Cybersecurity Services combat an APT with NDR

Attackers linked to Iran and China are actively targeting critical infrastructure.  Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…

4 minute read

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity 

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity 

The attack on Change Healthcare is a pivotal moment for healthcare cybersecurity.

3 minute read

5 highlights from the OpenText Government Summit

5 highlights from the OpenText Government Summit

Key learnings we took away from this year’s 2024 OpenText Government Summit

7 minute read

Increase speed and accuracy with AI driven static analysis auditing

Increase speed and accuracy with AI driven static analysis auditing

We are thrilled to announce the next generation of Audit Assistant, our innovative machine-learning–assisted auditing of SAST results. Fortify™ now unlocks and reproduces contextual awareness…

7 minute read

How to safeguard your data in a changing privacy landscape

How to safeguard your data in a changing privacy landscape

Data privacy is not a static concept. It evolves with the changing needs and expectations of consumers, businesses, and regulators. In 2023, we witnessed some…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.