Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read

How cyber resilience supports the resilient organization

Change is happening faster than ever and it can disrupt companies – even big, long-established brands – in the blink of an eye. The ability…

5 minute read

No more searching through the haystack for City of Dallas

For the City of Dallas, a small team faces a big task to collect data for public record requests, litigation and HR investigations. Led by…

2 minute read

How to select the best cyber resilience services in 2021

So far in our blog series on cyber resilience, we’ve covered what is cyber resilience and looked at the difference between cyber resilience and cyber…

8 minute read

Building trust in an era of constant threats

Our digital footprints grow larger every day. Generated from a multitude of places, such as social media, IoT, wearables, phones and more, 2.5 quintillion bytes of…

4 minute read

What is the difference between cyber resilience vs. cyber security?

Some commentators define cyber security as preventing hackers from attacking your network and accessing your systems and data. Cyber resilience, they may view, is about…

6 minute read

What’s new in OpenText EnCase Endpoint Security Cloud Edition (CE) 20.2

As data breaches continue to escalate in both their frequency and severity, it is more critical than ever for security leaders to counter with increased…

3 minute read

Building a resilient organization

Success today doesn’t guarantee success tomorrow. To remain successful, no matter what the future brings, organizations have always needed to demonstrate resilience. Today, that resilience…

5 minute read

How EnCase + AI computer vision makes investigations faster

The sheer volume of video and image content shared online is staggering. CISCO estimates that this year there will be close to a million minutes…

2 minute read

What’s new in CE 20.2 for Tableau Forensic Imager (TX1)

The increasing diversity, size and sophistication of digital media makes evidence collection a challenge. Digital investigators need a versatile solution that can acquire data from…

4 minute read

Ransomware attacks puts focus on cyber resilience for the public sector

It’s difficult to believe that criminals would use the COVID-19 pandemic as an opportunity for a fresh round of cyber attacks. But, that’s exactly what’s…

5 minute read

Be cyber resilient and prepare for an attack

Ransomware is a type of malicious software that gains access to files or systems to block user access. All files, systems or even devices are…

5 minute read

What’s new in OpenText EnCase Forensic and Endpoint Investigator Cloud Edition (CE) 20.2

When Apple introduced the T2 Security Chip in 2018, it set the computer forensics community back for years. Since then, Mac investigations have lagged behind,…

2 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up