Security

Series wrap – The rise of the threat hunter

As we reach the conclusion of the Threat Hunters blog series, it’s clear that the role of these cybersecurity specialists has never been more important.

October 8, 2024 6 minute read
Machine learning in cybersecurity

Machine learning in cybersecurity

Today’s networked world makes every system an easy target for cyberattacks. Automated tools make it easier for attackers to execute successful attacks and a new…

5 minute read

Catching threats in minutes, not days with OpenText MDR – Part 1

Catching threats in minutes, not days with OpenText MDR – Part 1

Every 11 seconds there is a ransomware attack. Bad actors are targeting companies and critical infrastructure systems for their next opportunity. In many cases, they…

6 minute read

Top 5 benefits of endpoint security software

Top 5 benefits of endpoint security software

Virtually every organization today is facing a rapid increase in the number of endpoints connecting to their network. In addition to user devices – such…

9 minute read

Three MDR strategies for government CISOs to quickly detect and respond to threats

Three MDR strategies for government CISOs to quickly detect and respond to threats

The US President’s Cybersecurity Executive Order, released in May 2021, outlines “the persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the…

4 minute read

An integrative approach to managing data privacy

An integrative approach to managing data privacy

Authored by Douglas Stewart, Senior Director, Solutions Consulting at OpenText A few months ago, while doing some data privacy research, I was excited to learn…

4 minute read

A day in the life of evidence: Part 2

A day in the life of evidence: Part 2

Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and detectives often have to access…

4 minute read

A day in the life of evidence: Part 1

A day in the life of evidence: Part 1

Modern policing is facing a significant shift in how evidence in a criminal investigation is managed. In the past, police precincts contained large evidence rooms,…

4 minute read

What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator

What’s new in OpenText Encase Forensic and OpenText EnCase Endpoint Investigator

The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator. Check out the latest…

3 minute read

Modern viewing and collaboration for the secure remote workforce

Modern viewing and collaboration for the secure remote workforce

Supporting your workforce requires visibility, collaboration, and adaptability. Bringing solutions to the cloud provides the flexibility your organization needs to enable your workforce to work…

2 minute read

Announcing OpenText Security & Protection Cloud CE 21.3

Announcing OpenText Security & Protection Cloud CE 21.3

Headline-making events like SolarWinds, Colonial Pipeline, and JBS have exposed a major vulnerability for security teams – a lack of resources to effectively detect and…

3 minute read

Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Kaseya VSA Zero-Day Supply Chain Ransomware Attack

Attackers carried out a supply chain ransomware attack by leveraging a zero-day vulnerability in Kaseya’s VSA software on Friday July 2, 2021. A compromised Kaseya…

1 minute read

How to select the best endpoint security solutions in 2021

How to select the best endpoint security solutions in 2021

The thought that a chain is only as strong as its weakest link is something that can keep IT security professionals awake at night. Today,…

10 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up