Security
-
Introducing Bricata Network Detection & Response
Helping businesses and organizations keep operations in a trusted state In today’s digital world, enterprises and organizations of all sizes…
Read more -
Stopping Remote Access Trojans (RATs) in their tracks with OpenText MDR
In 2012, we saw the first release of the Adwind malware family which were Java-based remote access tools (RATs) called…
Read more -
White House directive shows threat detection and response integral to a zero trust strategy
The White House, on January 26, announced a new zero-trust strategy to harden cybersecurity across federal agencies. Shalanda Young, Acting…
Read more -
Log4j vulnerability explained and how to respond
On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge.…
Read more -
Catching threats in minutes, not days with OpenText MDR – Part 2
We continue the conversation with Fabian Franco, Senior Manager of Digital Forensic Incident Response (DFIR), Threat Hunting and Security Operations,…
Read more -
Introducing OpenText EnCase Incident Response
Corporations are facing constant cybersecurity threats. They need to be able to respond by quickly and proactively conducting investigations that…
Read more -
Introducing OpenText Digital Evidence Center
Imagine this. You’re a large police force for a major metropolitan city. You investigate thousands of cases a year. In these investigations,…
Read more -
Announcing OpenText Security & Protection Cloud CE 21.4
With OpenText™ Cloud Editions (CE) 21.4, OpenText is pleased to bring to market additional capabilities and offerings aimed at making the world…
Read more -
De-risk your cybersecurity program
Cyber resilience is no longer optional, it is an essential component of Information Management to protect the most valuable assets:…
Read more -
#BeCyberSmart: Detect forensically and respond rapidly
October is Cyber Awareness Month. To mark this I’m writing about a subject that is close to my heart, a…
Read more -
Machine learning in cybersecurity
Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute…
Read more -
Catching threats in minutes, not days with OpenText MDR – Part 1
Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next…
Read more -
Top 5 benefits of endpoint security software
Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition…
Read more -
Three MDR strategies for government CISOs to quickly detect and respond to threats
The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that…
Read more -
An integrative approach to managing data privacy
Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research,…
Read more -
A day in the life of evidence: Part 2
Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and…
Read more -
A day in the life of evidence: Part 1
Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police…
Read more -
What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator
The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint…
Read more -
Modern viewing and collaboration for the secure remote workforce
Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to…
Read more -
Announcing OpenText Security & Protection Cloud CE 21.3
Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of…
Read more