Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read

What’s new in OpenText EnCase eDiscovery Cloud Edition (CE) 20.2

The endpoints that organizations need to access and manage for eDiscovery, regulatory compliance and investigations have increased quickly, adding complexity to legal projects requiring collection…

2 minute read

How to build a cyber resilience framework

In times of global crisis, some people always seem to show just how bad humans can be. Many hackers have seen the COVID-19 pandemic as…

6 minute read

Announcing OpenText Cloud Editions (CE) 20.2 for Legal Tech

Today, the traditional modes of business communication have literally shut down. Yet litigation, investigations and regulatory compliance haven’t let up. At OpenText™, we understand that…

3 minute read

Announcing OpenText Security Cloud Edition (CE) 20.2

In today’s cloud-focused market, it’s essential that security and forensic solutions facilitate cyber resilience with a focus on total endpoint protection and the collection of…

2 minute read

What is Cyber Resilience?

In 2015, former Cisco CEO John Chambers famously wrote: “There are two types of companies: Those that have been hacked, and those that haven’t yet discovered…

9 minute read

What is Customer Identity and Access Management (CIAM)?

Providing digital services to customers is a balancing act. You need to deliver outstanding customer experience at the same time as building trust in the…

7 minute read

What are Identity and Access Management (IAM) solutions?

Cybercrime will cost more than $6 trillion in 2021 and continually tops the CIO priority list. When it comes to cybersecurity, Identity and Access Management…

7 minute read

Four technology predictions for public sector in 2020

With the investment in technology and personnel training we are currently seeing, 2020 will be a year of reckoning for digital transformation initiatives in the…

5 minute read

Reducing the footprint of sensitive data in your enterprise

Research suggests that over one-fifth of all files are unprotected. Accenture estimates that information loss is the most expensive component of any cyberattack – representing…

4 minute read

Connecting with content on the go has never been easier or more secure

The way people work is evolving. Sitting at a desk all day, every day, is becoming rare. Employees expect more flexibility and are getting increasingly…

2 minute read

Striking a balance between security and usability of sensitive data

Last year, the number of personal records exposed by cyber attacks on the financial services industry was an incredible 446,575,334 – more than triple from…

4 minute read

What’s driving cyber crime in life sciences?

So far, 2019 has been the worst year ever for data breaches in the healthcare and Life Science sector. And attacks aren’t just increasing –…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up