Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
How cyber resilience supports the resilient organization
Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…
• 5 minute read
No more searching through the haystack for City of Dallas
For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation and HR investigations. Led by…
• 2 minute read
How to select the best cyber resilience services in 2021
So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference between cyber resilience and cyber…
• 8 minute read
Building trust in an era of constant threats
Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of…
• 4 minute read
What is the difference between cyber resilience vs. cyber security?
Some commentators define cyber security as preventing hackers from attacking your network and accessing your systems and data. Cyber resilience, they may view, is about…
• 6 minute read
What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2
As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…
• 3 minute read
Building a resilient organization
Success today doesn’t guarantee success tomorrow. To remain successful, no matter what the future brings, organizations have always needed to demonstrate resilience. Today, that resilience…
• 5 minute read
How EnCase + AI computer vision makes investigations faster
The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be close to a million minutes…
• 2 minute read
What’s new in CE 20.2 for Tableau Forensic Imager (TX1)
The increasing diversity, size and sophistication of digital media makes evidence collection a challenge. Digital investigators need a versatile solution that can acquire data from…
• 4 minute read
Ransomware attacks puts focus on cyber resilience for the public sector
It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber attacks. But, that’s exactly what’s…
• 5 minute read
Be cyber resilient and prepare for an attack
Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…
• 5 minute read
What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2
When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind,…
• 2 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up