Security

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

May 10, 2024 8 minute read
Boost your digital fitness for cyber resilience in 2020 – and beyond

Boost your digital fitness for cyber resilience in 2020 – and beyond

During this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions to home offices…

3 minute read

Announcing OpenText Security and Protection Cloud

Announcing OpenText Security and Protection Cloud

2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. During the pandemic, there has been a 5x increase in…

3 minute read

A little knowledge can be a dangerous thing…

A little knowledge can be a dangerous thing…

In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from less. Every action we take leaves a data footprint and every product we…

3 minute read

How to protect remote workers against today’s threats

How to protect remote workers against today’s threats

The current global situation has necessitated the immediate shift to remote work. It’s estimated that 42% of the workforce now works at home, which represents a massive shift from…

4 minute read

The seven critical requirements for modern data collection

The seven critical requirements for modern data collection

In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment, investigations and eDiscovery: an increasingly…

4 minute read

Modern data collection imperatives in today’s remote reality

Modern data collection imperatives in today’s remote reality

Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including an increasingly remote workforce. By…

3 minute read

What’s new in OpenText EnCase Endpoint Security 20.3

What’s new in OpenText EnCase Endpoint Security 20.3

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

3 minute read

How to select the best remote access solutions in 2021

How to select the best remote access solutions in 2021

In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…

8 minute read

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…

2 minute read

Is social media being mined for insider threats?

Is social media being mined for insider threats?

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…

3 minute read

How to treat employees like adults if they behave like children

How to treat employees like adults if they behave like children

In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…

5 minute read

Remotely recovering digital evidence from off-network devices

Remotely recovering digital evidence from off-network devices

Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.