Security

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

July 23, 2024 5 minute read
Enhancing Security Operations with OpenText Cybersecurity Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

4 minute read

Ensuring compliance with the NIS2 Directive 

Ensuring compliance with the NIS2 Directive 

In an increasingly digital world, the security of network and information systems is paramount. The European Union’s NIS2 Directive, a successor to the original NIS…

4 minute read

A study of threat hunters  

A study of threat hunters  

In today’s ever-evolving cybersecurity landscape, the role of threat hunters is becoming increasingly vital. These professionals are the frontline defenders against sophisticated cyber threats.

8 minute read

Ensuring AI-readiness with secure information management (SIM) 

Ensuring AI-readiness with secure information management (SIM) 

According to McKinsey, the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases….

5 minute read

Reimagine information with Cloud Editions (CE) 24.3

Reimagine information with Cloud Editions (CE) 24.3

The latest innovations in Business AI, Business Cloud, and Business Technology

7 minute read

Replaying an attack with OpenText NDR

Replaying an attack with OpenText NDR

In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream.  The reasons can be…

4 minute read

Boost AI readiness and reduce risk

Boost AI readiness and reduce risk

Are your GenAI tools bringing information security gaps to light?

5 minute read

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

5 minute read

OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges

OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges

The race to harness AI to advance business innovation, create efficiencies and augment workforce skillsets is on. Yet, organizations cannot overlook the foundational need for…

4 minute read

Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity

Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity

The concept of security posture, as defined by the National Institute of Standards and Technology (NIST), refers to an organization’s overall cybersecurity strength—including its defenses…

4 minute read

Reimagining Cyber podcast: 100 episodes strong

Reimagining Cyber podcast: 100 episodes strong

Reimaging Cyber is 100 episodes old! To celebrate how far we have come, let’s take a look back at where it all started and how…

3 minute read

Are you ready for a cyberattack?

Are you ready for a cyberattack?

In today’s digital age, cybersecurity threats are an ever-present danger for organizations of all sizes. While sophisticated technology solutions are critical in defending against cyber…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.