Security
-
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3
OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the…
Read more -
Is social media being mined for insider threats?
This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in…
Read more -
How to treat employees like adults if they behave like children
In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers.…
Read more -
Remotely recovering digital evidence from off-network devices
Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical…
Read more -
What is secure remote access?
If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew…
Read more -
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3
Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over…
Read more -
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data…
Read more -
How cyber resilience supports the resilient organization
Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink…
Read more -
No more searching through the haystack for City of Dallas
For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation…
Read more -
How to select the best cyber resilience services in 2021
So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference…
Read more -
Building trust in an era of constant threats
Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones…
Read more -
What is the difference between cyber resilience vs. cyber security?
Some commentators define cyber security as preventing hackers from attacking your network and accessing your systems and data. Cyber resilience,…
Read more -
What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2
As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security…
Read more -
Building a resilient organization
Success today doesn’t guarantee success tomorrow. To remain successful, no matter what the future brings, organizations have always needed to…
Read more -
How EnCase + AI computer vision makes investigations faster
The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be…
Read more -
What’s new in CE 20.2 for Tableau Forensic Imager (TX1)
The increasing diversity, size and sophistication of digital media makes evidence collection a challenge. Digital investigators need a versatile solution…
Read more -
Ransomware attacks puts focus on cyber resilience for the public sector
It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber…
Read more -
Be cyber resilient and prepare for an attack
Ransomware is a type of malicious software that gains access to files or systems to block user access. All files,…
Read more -
What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2
When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then,…
Read more -
What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2
The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity…
Read more