Security

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

May 10, 2024 8 minute read
Autonomous vehicles: What are the security risks?

Autonomous vehicles: What are the security risks?

With companies like Tesla and Google, we are beginning to see the first signs of a driverless future – and, according to some reports, self-driving…

2 minute read

Enabling simple and secure external file sharing and collaboration

Enabling simple and secure external file sharing and collaboration

We’ve all experienced this scenario before: You finish collaborating with your team on a document and have it stored in your organization’s content management system,…

3 minute read

The Internet of Things has an identity problem

The Internet of Things has an identity problem

According to Juniper Research, the number of Industrial IoT connections is expected to reach 46 billion by 20231.  As IoT deployments move from simple monitoring…

4 minute read

Developing an industry, creating the experts

Developing an industry, creating the experts

It’s difficult to grasp today that, even in the mid 1990s, the legal industry struggled to understand how to properly prepare and present digital evidence…

5 minute read

About that information leak: It’s coming from inside the organization

About that information leak: It’s coming from inside the organization

Law firms are often considered a soft target when it comes to data security: one in five law firms was hacked last year and six…

5 minute read

Data privacy is changing the relationship between you and your customers

Data privacy is changing the relationship between you and your customers

The capture and collection of personal data is an important requirement in order to provide the individual, customized and tailored experience that people are demanding….

4 minute read

OpenText at RSA: EnCase wins top forensic award from SC Magazine

OpenText at RSA: EnCase wins top forensic award from SC Magazine

On March 5 at RSA 2019, SC Magazine named OpenText™ EnCase™ Endpoint Investigator, OpenText™ EnCase™ Forensic, and OpenText™ EnCase™ Mobile Investigator as the Best Computer…

3 minute read

OpenText at RSA: Detection and response from the bottom up

OpenText at RSA: Detection and response from the bottom up

It’s 2019, yet the fact still remains: attackers can compromise a network in a matter of minutes, but only a fraction of breaches are discovered…

7 minute read

The three problems OpenText Security will be talking about at RSA

The three problems OpenText Security will be talking about at RSA

RSA 2019 is right around the corner. The most exciting security conference of the year – apart from OpenText™ Enfuse of course – RSA is a…

4 minute read

Work faster and save money

Work faster and save money

Most people rely on traditional methods of viewing and annotating different types of documents – for example, using Adobe® Acrobat® to work with PDFs or AutoCAD®…

2 minute read

OpenText Buys Catalyst Repository Systems, Inc.

OpenText Buys Catalyst Repository Systems, Inc.

I’m pleased to announce that OpenText has acquired Catalyst Repository Systems, Inc., a leading provider of cloud-based eDiscovery software for large-scale discovery and regulatory compliance….

2 minute read

Powerful digital forensics with OpenText EnCase Forensic 8.08

Powerful digital forensics with OpenText EnCase Forensic 8.08

As technology evolves, so do the challenges of digital forensic investigation. Whether in the field or the lab, digital forensic examiners need to overcome investigation…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.