Security
Securing AI Deployments: Striking the Balance
The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…
Ransomware attacks puts focus on cyber resilience for the public sector
It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber attacks. But, that’s exactly what’s…
• 5 minute read
Be cyber resilient and prepare for an attack
Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…
• 5 minute read
What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2
When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind,…
• 2 minute read
What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2
The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity to legal projects requiring collection…
• 2 minute read
How to build a cyber resilience framework
In times of global crisis, some people always seem to show just how bad humans can be. Many hackers have seen the COVID-19 pandemic as…
• 6 minute read
Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech
Today, the traditional modes of business communication have literally shut down. Yet litigation, investigations and regulatory compliance haven’t let up. At OpenText™, we understand that…
• 3 minute read
Announcing OpenText Security Cloud Edition (CE) 20.2
In today’s cloud-focused market, it’s essential that security and forensic solutions facilitate cyber resilience with a focus on total endpoint protection and the collection of…
• 2 minute read
What is Cyber Resilience?
In 2015, former Cisco CEO John Chambers famously wrote: “There are two types of companies: Those that have been hacked, and those that haven’t yet discovered…
• 9 minute read
What is Customer Identity and Access Management (CIAM)?
Providing digital services to customers is a balancing act. You need to deliver outstanding customer experience at the same time as building trust in the…
• 7 minute read
What are Identity and Access Management (IAM) solutions?
Cybercrime will cost more than $6 trillion in 2021 and continually tops the CIO priority list. When it comes to cybersecurity, Identity and Access Management…
• 7 minute read
Four technology predictions for public sector in 2020
With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the…
• 5 minute read
Reducing the footprint of sensitive data in your enterprise
Research suggests that over one-fifth of all files are unprotected. Accenture estimates that information loss is the most expensive component of any cyberattack – representing…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.