Security

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

June 13, 2024 5 minute read
What’s new in OpenText EnCase Endpoint Security 20.3

What’s new in OpenText EnCase Endpoint Security 20.3

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

3 minute read

How to select the best remote access solutions in 2021

How to select the best remote access solutions in 2021

In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…

8 minute read

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3

OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…

2 minute read

Is social media being mined for insider threats?

Is social media being mined for insider threats?

This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…

3 minute read

How to treat employees like adults if they behave like children

How to treat employees like adults if they behave like children

In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…

5 minute read

Remotely recovering digital evidence from off-network devices

Remotely recovering digital evidence from off-network devices

Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…

4 minute read

What is secure remote access?

What is secure remote access?

If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew by an incredible 730% in…

10 minute read

What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3

Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over a myriad of sources—from desktops…

3 minute read

NIST Privacy Framework – A focus on the identify function

NIST Privacy Framework – A focus on the identify function

Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…

5 minute read

How cyber resilience supports the resilient organization

How cyber resilience supports the resilient organization

Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…

5 minute read

No more searching through the haystack for City of Dallas

No more searching through the haystack for City of Dallas

For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation and HR investigations. Led by…

2 minute read

How to select the best cyber resilience services in 2021

How to select the best cyber resilience services in 2021

So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference between cyber resilience and cyber…

8 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.