Security

Understanding MITRE ATT&CK and Tidal Cyber Vendor Registry

In the ever-evolving cybersecurity landscape, staying ahead of the growing number of threats is a continuous challenge. Two critical resources in this fight are the…

June 13, 2024 5 minute read
Building trust in an era of constant threats

Building trust in an era of constant threats

Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of…

4 minute read

What is the difference between cyber resilience vs. cyber security?

What is the difference between cyber resilience vs. cyber security?

Some commentators define cyber security as preventing hackers from attacking your network and accessing your systems and data. Cyber resilience, they may view, is about…

6 minute read

What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2

What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

3 minute read

Building a resilient organization

Building a resilient organization

Success today doesn’t guarantee success tomorrow. To remain successful, no matter what the future brings, organizations have always needed to demonstrate resilience. Today, that resilience…

5 minute read

How EnCase + AI computer vision makes investigations faster

How EnCase + AI computer vision makes investigations faster

The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be close to a million minutes…

2 minute read

What’s new in CE 20.2 for Tableau Forensic Imager (TX1)

What’s new in CE 20.2 for Tableau Forensic Imager (TX1)

The increasing diversity, size and sophistication of digital media makes evidence collection a challenge. Digital investigators need a versatile solution that can acquire data from…

4 minute read

Ransomware attacks puts focus on cyber resilience for the public sector

Ransomware attacks puts focus on cyber resilience for the public sector

It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber attacks. But, that’s exactly what’s…

5 minute read

Be cyber resilient and prepare for an attack

Be cyber resilient and prepare for an attack

Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…

5 minute read

What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind,…

2 minute read

What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2

What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2

The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity to legal projects requiring collection…

2 minute read

How to build a cyber resilience framework

How to build a cyber resilience framework

In times of global crisis, some people always seem to show just how bad humans can be. Many hackers have seen the COVID-19 pandemic as…

6 minute read

Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech

Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech

Today, the traditional modes of business communication have literally shut down. Yet litigation, investigations and regulatory compliance haven’t let up. At OpenText™, we understand that…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.