Security

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

June 13, 2024 5 minute read
OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges

OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges

The race to harness AI to advance business innovation, create efficiencies and augment workforce skillsets is on. Yet, organizations cannot overlook the foundational need for…

4 minute read

Let new role-based learning paths guide your OpenText learning journey

Let new role-based learning paths guide your OpenText learning journey

How do you get from Point A to Point B in the quickest, most efficient way? You could walk haphazardly, changing directions randomly and making…

4 minute read

Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity

Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity

The concept of security posture, as defined by the National Institute of Standards and Technology (NIST), refers to an organization’s overall cybersecurity strength—including its defenses…

4 minute read

Reimagining Cyber podcast: 100 episodes strong

Reimagining Cyber podcast: 100 episodes strong

Reimaging Cyber is 100 episodes old! To celebrate how far we have come, let’s take a look back at where it all started and how…

3 minute read

Are you ready for a cyberattack?

Are you ready for a cyberattack?

In today’s digital age, cybersecurity threats are an ever-present danger for organizations of all sizes. While sophisticated technology solutions are critical in defending against cyber…

4 minute read

Securing AI Deployments: Striking the Balance

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

8 minute read

Unlocking AI potential for CISOs: A framework for safe adoption

Unlocking AI potential for CISOs: A framework for safe adoption

Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…

7 minute read

The new wave of channel marketing: What partners can expect in H2 2024

The new wave of channel marketing: What partners can expect in H2 2024

We’re well into 2024 now and the channel marketing landscape continues to change, thanks to a blend of innovation and connectivity. At OpenText™, we’re not…

5 minute read

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…

5 minute read

Machine vs. machine

Machine vs. machine

Take protection to the next level with AI cybersecurity

4 minute read

Elevate human potential with Cloud Editions (CE) 24.2

Elevate human potential with Cloud Editions (CE) 24.2

Latest innovations revealed at OpenText World Europe 2024

10 minute read

Transforming digital forensic investigations

Transforming digital forensic investigations

In the modern landscape of digital forensics, investigators must navigate many challenges stemming from the exponential growth of digital data.

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.