Security

Building a threat hunting team

Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.

September 3, 2024 5 minute read
Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Ensuring SIEM data sovereignty: the case for on-prem OpenText ArcSight SIEM

Given the critical nature of cybersecurity for industry sectors such as defense, healthcare, finance, and government, ensuring SIEM data sovereignty has never been more crucial….

5 minute read

Building trust in AI: Key strategies for data protection and ethical use 

Building trust in AI: Key strategies for data protection and ethical use 

Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it’s significantly changing the way businesses operate and thrive. AI tools are proving…

3 minute read

How to support threat hunters

How to support threat hunters

Threat hunting is a critical aspect of cybersecurity, involving the proactive search for threats and vulnerabilities within an organization’s network. For threat hunters to be effective, they need robust support from their managers and teams.

6 minute read

How threat hunters stay informed and collaborate 

How threat hunters stay informed and collaborate 

In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. To do this, they need to stay informed and effectively collaborate.

6 minute read

Understanding threat hunter personas

Understanding threat hunter personas

Threat hunter personas bring the threat hunter to life and help communicate the important needs of threat hunters to the organizations that support them.

7 minute read

Top three challenges of threat hunting

Top three challenges of threat hunting

Our series on threat hunters has covered what they are and what they do. This week’s post highlights two common mistakes threat hunters make and…

5 minute read

Threat hunters – A day in the life

Threat hunters – A day in the life

Threat hunting is not just a job; it’s a commitment to staying one step ahead of cyber adversaries. In this post, we’ll dive into the…

6 minute read

Three key aspects of being a threat hunter  

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

5 minute read

Enhancing Security Operations with OpenText Cybersecurity Services

Enhancing Security Operations with OpenText Cybersecurity Services

In today’s hyper-connected digital landscape, the proliferation of devices and applications has expanded the attack surface for potential cybersecurity threats. Cyberattacks are on track to…

4 minute read

Ensuring compliance with the NIS2 Directive 

Ensuring compliance with the NIS2 Directive 

In an increasingly digital world, the security of network and information systems is paramount. The European Union’s NIS2 Directive, a successor to the original NIS…

4 minute read

A study of threat hunters  

A study of threat hunters  

In today’s ever-evolving cybersecurity landscape, the role of threat hunters is becoming increasingly vital. These professionals are the frontline defenders against sophisticated cyber threats.

8 minute read

Ensuring AI-readiness with secure information management (SIM) 

Ensuring AI-readiness with secure information management (SIM) 

According to McKinsey, the enterprise use of Generative AI could generate an astounding $2.6 trillion to $4.4 trillion annually across more than 60 use cases….

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.