Security
-
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware…
Read more -
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial…
Read more -
10 steps to combat the high cost of cyber insurance
As the frequency and scope of cyberattacks increases, so does the cost of cyber insurance. And the rise is dramatic.…
Read more -
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the…
Read more -
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and…
Read more -
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with…
Read more -
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without…
Read more -
Ride the digital ecosystem wave, securely
Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses…
Read more -
Strengthen information protection with a Zero Trust Information Governance program
“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun…
Read more -
Smart PCAP: A time machine for the SOC
Anyone familiar with packet forensics or packet recording knows you can spend hours poring over bulk information and waiting for…
Read more -
What we can learn from the ACC 2022 State of Cybersecurity Report
Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of…
Read more -
A good foundation is key to digital forensic investigations
I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When…
Read more -
Top 10 network security best practices
Network security is constantly evolving. To stay ahead of bad actors, follow these 10 best practices to reduce the risk…
Read more -
6 predictions for the public sector industry in 2023
The pandemic has precipitated a fundamental shift in the way citizen services are delivered. In the past year, governments have…
Read more -
Getting to know your tools
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the…
Read more -
A tale of two cities: Flexible-first meets privacy-first
We have all experienced this ourselves in the workplace lately: One week to another never looking the same with a…
Read more -
OpenText is a leader in Detection and Response
MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with…
Read more -
Technology meets tenacity
Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your…
Read more -
OpenText MxDR platform: a team player
There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack…
Read more -
Stopping threats cold
Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or…
Read more