Security

Machine vs. machine

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….

April 19, 2024 4 minutes read
Announcing OpenText Security Cloud Edition (CE) 20.2

Announcing OpenText Security Cloud Edition (CE) 20.2

In today’s cloud-focused market, it’s essential that security and forensic solutions facilitate cyber resilience with a focus on total endpoint protection and the collection of…

April 8, 2020 2 minutes read
What is Cyber Resilience?

What is Cyber Resilience?

In 2015, former Cisco CEO John Chambers famously wrote: “There are two types of companies: Those that have been hacked, and those that haven’t yet discovered…

March 20, 2020 9 minutes read
What is Customer Identity and Access Management (CIAM)?

What is Customer Identity and Access Management (CIAM)?

Providing digital services to customers is a balancing act. You need to deliver outstanding customer experience at the same time as building trust in the…

February 26, 2020 7 minutes read
What are Identity and Access Management (IAM) solutions?

What are Identity and Access Management (IAM) solutions?

Cybercrime will cost more than $6 trillion in 2021 and continually tops the CIO priority list. When it comes to cybersecurity, Identity and Access Management…

February 20, 2020 7 minutes read
Four technology predictions for public sector in 2020

Four technology predictions for public sector in 2020

With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the…

January 22, 2020 5 minutes read
Reducing the footprint of sensitive data in your enterprise

Reducing the footprint of sensitive data in your enterprise

Research suggests that over one-fifth of all files are unprotected. Accenture estimates that information loss is the most expensive component of any cyberattack – representing…

December 16, 2019 4 minutes read
Connecting with content on the go has never been easier or more secure

Connecting with content on the go has never been easier or more secure

The way people work is evolving. Sitting at a desk all day, every day, is becoming rare. Employees expect more flexibility and are getting increasingly…

December 10, 2019 2 minutes read
Striking a balance between security and usability of sensitive data

Striking a balance between security and usability of sensitive data

Last year, the number of personal records exposed by cyber attacks on the financial services industry was an incredible 446,575,334 – more than triple from…

December 4, 2019 4 minutes read
What’s driving cyber crime in life sciences?

What’s driving cyber crime in life sciences?

So far, 2019 has been the worst year ever for data breaches in the healthcare and Life Science sector. And attacks aren’t just increasing –…

November 20, 2019 4 minutes read
The need for continuous endpoint visibility

The need for continuous endpoint visibility

In the world of security, you can always count on one simple truth: you can’t respond to a threat that hasn’t been detected. And with…

November 5, 2019 4 minutes read
Addressing the skills shortage in security

Addressing the skills shortage in security

Cybersecurity incidents currently represent one of the biggest threats to organizations. Yet in today’s enterprise security landscape, security leaders have the impossible job of providing…

November 4, 2019 4 minutes read
Security in a zero-trust world

Security in a zero-trust world

Keeping your data and IT infrastructure safe and secure is more challenging than ever in today’s “zero-trust” world. But what does “zero-trust” mean? The reality…

October 15, 2019 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.