Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
How to protect remote workers against today’s threats
The current global situation has necessitated the immediate shift to remote work. It’s estimated that 42% of the workforce now works at home, which represents a massive shift from…
• 4 minute read
The seven critical requirements for modern data collection
In an earlier blog, I discussed the trends necessitating a modern approach to data collections to support early case assessment, investigations and eDiscovery: an increasingly…
• 4 minute read
Modern data collection imperatives in today’s remote reality
Modern data collection for eDiscovery has always been demanding. Today, the challenges are exacerbated by a number of trends, including an increasingly remote workforce. By…
• 3 minute read
What’s new in OpenText EnCase Endpoint Security 20.3
As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…
• 3 minute read
How to select the best remote access solutions in 2021
In our last blog we took a look at what is secure remote access. All the signs suggest that as we slowly emerge from the…
• 8 minute read
What’s new in OpenText EnCase Forensic and OpenText Endpoint Investigator 20.3
OpenText™ EnCase™ Forensic and OpenText™ EnCase™ Endpoint Investigator 20.3 includes enhanced forensic capabilities and user-first workflow improvements that increase the efficiency of investigations. This release…
• 2 minute read
Is social media being mined for insider threats?
This blog is co-authored by Annie John and Todd Cernetic. “Sometimes the best hiding place is the one that’s in plain sight” said Stephenie Meyer,…
• 3 minute read
How to treat employees like adults if they behave like children
In January 2020, employees around the world were debating business decisions in brick-and-mortar meeting rooms and chatting around water coolers. A few months later, they…
• 5 minute read
Remotely recovering digital evidence from off-network devices
Modern digital investigations are difficult, time-consuming and complex to conduct. They often involve many systems and devices spread across geographical boundaries and locations, and may…
• 4 minute read
What is secure remote access?
If any technology has come to the forefront during COVID-19, it’s remote access. In the US alone, remote work grew by an incredible 730% in…
• 10 minute read
What’s new in EnCase eDiscovery Cloud Edition (CE) 20.3
Collecting data is a crucial requirement for responding to litigation, regulatory response and investigations. However, key data is spread over a myriad of sources—from desktops…
• 3 minute read
NIST Privacy Framework – A focus on the identify function
Managing privacy using a risk-based approach is a consistent theme in many recent privacy regulations, including the EU General Data Protection Regulation (GDPR) and the…
• 5 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up