Security
Three key aspects of being a threat hunter
In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…
![Enhancing Security Operations with OpenText Cybersecurity Services](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-blog-PS-image1-1200x675-en-341x192.jpg)
Enhancing Security Operations with OpenText Cybersecurity Services
In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…
• 4 minute read
![Ensuring compliance with the NIS2 Directive](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-blog-PS-image2-1200x675-en-341x192.jpg)
Ensuring compliance with the NIS2 Directive
In an increasingly digital world, the security of network and information systems is paramount. The European Union’s NIS2 Directive, a successor to the original NIS…
• 4 minute read
![A study of threat hunters](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-how-to-support-threat-hunter-blog-en-341x192.jpg)
A study of threat hunters
In today’s ever-evolving cybersecurity landscape, the role of threat hunters is becoming increasingly vital. These professionals are the frontline defenders against sophisticated cyber threats.
• 8 minute read
![Ensuring AI-readiness with secure information management (SIM)](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-blog-AI-readiness-1200x675-en-341x192.jpg)
Ensuring AI-readiness with secure information management (SIM)
According to McKinsey, the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases….
• 5 minute read
![Reimagine information with Cloud Editions (CE) 24.3](https://blogs.opentext.com/wp-content/uploads/2023/07/Blog-Muhi-1200x675-1-341x192.jpg)
Reimagine information with Cloud Editions (CE) 24.3
The latest innovations in Business AI, Business Cloud, and Business Technology
• 7 minute read
![Secure smarter, not harder with AI-powered code fix suggestions](https://blogs.opentext.com/wp-content/uploads/2024/06/opentext-image-blog-CyberSecurity-Fortify-Aviator-1200x675-en-341x192.png)
Secure smarter, not harder with AI-powered code fix suggestions
In today’s fast-paced development environment, maintaining robust security practices while striving for rapid release cycles can be a daunting challenge. Enter Fortify Aviator, your new…
• 3 minute read
![Replaying an attack with OpenText NDR](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-blog-ot-ndr-1200x675-en-341x192.jpg)
Replaying an attack with OpenText NDR
In Network Detection and Response (NDR) related operations, there is often a need to replay a Packet Capture (PCAP) data stream. The reasons can be…
• 4 minute read
![Series intro – The rise of the threat hunter](https://blogs.opentext.com/wp-content/uploads/2024/07/opentext-image-challenges-of-a-threat-hunter-blog-en-341x192.jpg)
Series intro – The rise of the threat hunter
In the ever-evolving landscape of cyber threats, where automated systems and AI stand as the first line of defense, there exists a critical yet often…
• 5 minute read
![Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry](https://blogs.opentext.com/wp-content/uploads/2024/06/opentext-image-blog-IPS-security-services2-1200x675-en-341x192.jpg)
Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry
In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…
• 5 minute read
![OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges](https://blogs.opentext.com/wp-content/uploads/2024/06/opentext-image-blog-global-managed-security-survey-1200x675-en-341x192.jpg)
OpenText Cybersecurity 2024 Global Managed Security Survey: All eyes on AI business opportunities and challenges
The race to harness AI to advance business innovation, create efficiencies and augment workforce skillsets is on. Yet, organizations cannot overlook the foundational need for…
• 4 minute read
![Let new role-based learning paths guide your OpenText learning journey](https://blogs.opentext.com/wp-content/uploads/2024/06/shutterstock_2239309211-1-341x192.png)
Let new role-based learning paths guide your OpenText learning journey
How do you get from Point A to Point B in the quickest, most efficient way? You could walk haphazardly, changing directions randomly and making…
• 4 minute read
![Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity](https://blogs.opentext.com/wp-content/uploads/2024/06/opentext-image-blog-Automating-protection-cybersecurity-1200x675-en-341x192.jpg)
Beyond the buzzwords: Automating protection with AI-enabled solutions for modern cybersecurity
The concept of security posture, as defined by the National Institute of Standards and Technology (NIST), refers to an organization’s overall cybersecurity strength—including its defenses…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.