Security
Machine vs. machine
Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….
What’s new in OpenText EnCase Endpoint Security 20.3
As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…
How to select the best remote access solutions in 2021
In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3
OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…
Is social media being mined for insider threats?
This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…
How to treat employees like adults if they behave like children
In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…
Remotely recovering digital evidence from off-network devices
Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…
What is secure remote access?
If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew by an incredible 730% in…
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3
Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over a myriad of sources—from desktops…
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…
How cyber resilience supports the resilient organization
Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…
No more searching through the haystack for City of Dallas
For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation and HR investigations. Led by…
How to select the best cyber resilience services in 2021
So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference between cyber resilience and cyber…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.