Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
Protecting your data in a zero-trust world
Recently, Netflix released The Great Hack, the much-anticipated documentary that examines the Cambridge Analytica scandal and explores how companies can use the vast amounts of…
• 4 minute read
The latest OpenText Enfuse 2019 news
OpenText Enfuse 2019 takes place November 11-14 at The Venetian Resort Las Vegas. We’ve collected a summary of all the Enfuse press releases to keep…
• 2 minute read
How to manage content chaos
ILTACON has been a staple for legal and IT professionals for over 40 years, and this year’s conference promises not to disappoint. The agenda is…
• 5 minute read
An introduction to 360 degree threat detection
According to Accenture, the cost of cybercrime to US Financial Services companies rose 40% between 2014 and 2017, on average costing companies over $18 million…
• 6 minute read
Introducing the largest coordinated release in OpenText history
Today’s market-disrupting technologies are driving new and exciting opportunities to transform the way we live our personal lives, the way we do business, and the…
• 9 minute read
What’s New in OpenText Security
OpenText™ continues to address the needs of corporate and law-enforcement investigators around the world since its acquisition of the EnCase™ and Tableau line of products…
• 3 minute read
What’s new in OpenText InfoArchive EP6
Digital transformation is hampered when organizations have to maintain information in obsolete, and often unsupported, line of business applications. Enterprises looking to migrate this inactive…
• 3 minute read
Mobile and wearable device examination
With the arrival of 5G technology, the increasing popularity of fitness trackers and smart watches, and growth in other “wearable tech”, the amount of data…
• 3 minute read
Cybersecurity in manufacturing
Not long ago, many manufacturing CIOs thought that cybersecurity was something only the financial sector had to worry about. Why would anyone want to hack…
• 6 minute read
Autonomous vehicles: What are the security risks?
With companies like Tesla and Google, we are beginning to see the first signs of a driverless future – and, according to some reports, self-driving…
• 2 minute read
Enabling simple and secure external file sharing and collaboration
We’ve all experienced this scenario before: You finish collaborating with your team on a document and have it stored in your organization’s content management system,…
• 3 minute read
The Internet of Things has an identity problem
According to Juniper Research, the number of Industrial IoT connections is expected to reach 46 billion by 20231. As IoT deployments move from simple monitoring…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up