Security

Machine vs. machine

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….

April 19, 2024 4 minutes read
Building trust in an era of constant threats

Building trust in an era of constant threats

Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of…

June 29, 2020 4 minutes read
What is the difference between cyber resilience vs. cyber security?

What is the difference between cyber resilience vs. cyber security?

Some commentators define cyber security as preventing hackers from attacking your network and accessing your systems and data. Cyber resilience, they may view, is about…

June 9, 2020 6 minutes read
What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2

What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

June 3, 2020 3 minutes read
Building a resilient organization

Building a resilient organization

Success today doesn’t guarantee success tomorrow. To remain successful, no matter what the future brings, organizations have always needed to demonstrate resilience. Today, that resilience…

May 29, 2020 5 minutes read
How EnCase + AI computer vision makes investigations faster

How EnCase + AI computer vision makes investigations faster

The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be close to a million minutes…

May 8, 2020 2 minutes read
What’s new in CE 20.2 for Tableau Forensic Imager (TX1)

What’s new in CE 20.2 for Tableau Forensic Imager (TX1)

The increasing diversity, size and sophistication of digital media makes evidence collection a challenge. Digital investigators need a versatile solution that can acquire data from…

May 7, 2020 4 minutes read
Ransomware attacks puts focus on cyber resilience for the public sector

Ransomware attacks puts focus on cyber resilience for the public sector

It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber attacks. But, that’s exactly what’s…

April 28, 2020 5 minutes read
Be cyber resilient and prepare for an attack

Be cyber resilient and prepare for an attack

Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…

April 21, 2020 5 minutes read
What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind,…

April 13, 2020 2 minutes read
What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2

What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2

The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity to legal projects requiring collection…

April 13, 2020 2 minutes read
How to build a cyber resilience framework

How to build a cyber resilience framework

In times of global crisis, some people always seem to show just how bad humans can be. Many hackers have seen the COVID-19 pandemic as…

April 13, 2020 6 minutes read
Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech

Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech

Today, the traditional modes of business communication have literally shut down. Yet litigation, investigations and regulatory compliance haven’t let up. At OpenText™, we understand that…

April 8, 2020 3 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.