Security

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

June 13, 2024 5 minute read
Achieving seamless eDiscovery

Achieving seamless eDiscovery

Business and litigation go hand in hand in the 21st century. From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline processes and procedures to simplify…

3 minute read

SolarWinds: Threat hunt to contain and eradicate

SolarWinds: Threat hunt to contain and eradicate

As the cyberattack story continues to unfold around the SUNBURST and SUPERNOVA malware distributed through a compromised SolarWinds software update, more private and public sector…

3 minute read

Meeting the new challenges of digital evidence management

Meeting the new challenges of digital evidence management

Dealing with the scale and complexity of evidence in rich-media formats (images, video and audio) is one of the key challenges in evidence management for…

3 minute read

The changing state of enterprise security

The changing state of enterprise security

Cyber security, digital investigations and eDiscovery will never be the same. In the past year, market uncertainty and changing consumer behavior have increased cybercrime and…

5 minute read

How to secure all remote work – including third-party

How to secure all remote work – including third-party

The rush to provide remote employees with access to enterprise resources at the onset of the pandemic was the tipping point for remote access as…

5 minute read

To do, know and be… ask, why not me!

To do, know and be… ask, why not me!

Authored by Maureen Kaplan, VP Sales, OpenText Security It was the response to her childhood ‘declarations of I can’t’ that changed Lieutenant General (ret) Nadja West’s…

4 minute read

Boost your digital fitness for cyber resilience in 2020 – and beyond

Boost your digital fitness for cyber resilience in 2020 – and beyond

During this tumultuous year, digital tools have let us keep working even as we’ve shuttered once-busy office spaces, moved by the millions to home offices…

3 minute read

Announcing OpenText Security and Protection Cloud

Announcing OpenText Security and Protection Cloud

2020 has proven to be an incredibly challenging year for Information Security and Investigative teams. During the pandemic, there has been a 5x increase in…

3 minute read

A little knowledge can be a dangerous thing…

A little knowledge can be a dangerous thing…

In today’s world, everything moves so fast. Everyone wants something yesterday. Everyone demands and expects more from less. Every action we take leaves a data footprint and every product we…

3 minute read

How to protect remote workers against today’s threats

How to protect remote workers against today’s threats

The current global situation has necessitated the immediate shift to remote work. It’s estimated that 42% of the workforce now works at home, which represents a massive shift from…

4 minute read

The seven critical requirements for modern data collection

The seven critical requirements for modern data collection

In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment, investigations and eDiscovery: an increasingly…

4 minute read

Modern data collection imperatives in today’s remote reality

Modern data collection imperatives in today’s remote reality

Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including an increasingly remote workforce. By…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.