Security
-
Cut the noise. Cue the results.
If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have? …
Read more -
The human dimension of cybercrime
It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions. …
Read more -
Curbing Insider Threats Today Requires a Holistic Approach
October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable…
Read more -
Apple property list parsing with EnScript
The third blog in the series following on from Using the Generic SQLite Database Parser EnScript in forensic examination of…
Read more -
OpenText Security eliminates digital blind spots with enhanced threat detection, investigation and response capabilities
Cyber attackers, insiders seeking to use confidential and sensitive information to their advantage, and criminals lurk everywhere – on endpoints,…
Read more -
Targeted DFIR evidence collections
During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach…
Read more -
Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device
In my previous blog, the use of EnScript was introduced as a benefit to extend the artifact reach and add…
Read more -
Network security: from reactive alerts to proactive threat hunting
In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending…
Read more -
Affix cyber resilience to your Managed Services
Managed Service Providers (MSPs) are a major target for cyber attacks and should consider adding Managed Detection and Response (MDR)…
Read more -
Mobile device examination with EnCase
Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a…
Read more -
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors
The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors…
Read more -
Discover how to make the world a safer, more secure place at OpenText World 2022
Today’s security threats pose many challenges for organizations. Ransomware has evolved, phishing is all too common, and law enforcement agencies…
Read more -
What’s new in OpenText EnCase Endpoint Investigator
August 2022: What’s new in EnCase Endpoint Investigator CE 22.3? As enterprises continue to face the challenges associated with cybersecurity…
Read more -
What’s new in OpenText EnCase Forensic
August 2022: What’s New with EnCase Forensic v22.3 With the release of EnCase Forensic v22.3, digital forensic investigators can now…
Read more -
Enabling collaboration in digital forensic investigations
A customer recently told me they could be at search warrants every day of the year and never make a…
Read more -
Partnering with law enforcement to protect children
Forty one years ago this week, Adam John Walsh was abducted from a Florida department store and murdered at just…
Read more -
What’s new in OpenText Identity and Access Management
June 2022: OpenText Identity and Access Management CE 22.2 OT IAM platform 22.2 will deliver primarily on the following themes:…
Read more -
Managing the threat from within: How organizations and law firms are bolstering security postures to protect sensitive data
The rapid growth of digital communications has affected every industry and vertical, creating increasingly document-intensive operations and the need to…
Read more -
Turn up the volume with Table Top Exercises
MITRE released a new edition of its book on “the way security operations is done”, 11 Strategies of a World-Class…
Read more