Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read
Securing AI Deployments: Striking the Balance

Securing AI Deployments: Striking the Balance

The recent IT leaders CIO MarketPulse survey by Foundry underscores that data must be ready for AI. If it’s not accurate, accessible, and secure, organizations…

8 minute read

Unlocking AI potential for CISOs: A framework for safe adoption

Unlocking AI potential for CISOs: A framework for safe adoption

Many organizations are in the exploratory phases of using Artificial Intelligence (AI). Some of these AIs include machine learning (ML), and natural language processing (NLP)…

7 minute read

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

Unlocking insights: highlights from the 2024 Verizon Data Breach Investigations Report (DBIR) 

It’s time for the 2024 Verizon Data Breach Investigations Report (DBIR)! If you aren’t familiar with DBIR, provides invaluable insights into the evolving landscape of…

5 minute read

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Navigating the Intersection of AI and Financial Risk: A Proactive Approach

Don’t miss out on the opportunity to transform your organization’s approach to data security, privacy, and governance in the age of GenAI.

3 minute read

Cybersecurity Services combat an APT with NDR

Cybersecurity Services combat an APT with NDR

Attackers linked to Iran and China are actively targeting critical infrastructure.  Both the U.S. Environmental Protection Agency and National Security Agency have requested that each…

4 minute read

OpenText Summit | Houston Energy 2024 summary & key takeaways

OpenText Summit | Houston Energy 2024 summary & key takeaways

A deep dive into the future of energy operations with AI

10 minute read

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity 

The Change Healthcare Cyberattack: A Wake-Up Call for Healthcare Cybersecurity 

The attack on Change Healthcare is a pivotal moment for healthcare cybersecurity.

3 minute read

Increase speed and accuracy with AI driven static analysis auditing

Increase speed and accuracy with AI driven static analysis auditing

We are thrilled to announce the next generation of Audit Assistant, our innovative machine-learning–assisted auditing of SAST results. Fortify™ now unlocks and reproduces contextual awareness…

7 minute read

Strengthening Higher Education Institutions against evolving cyberthreats

Strengthening Higher Education Institutions against evolving cyberthreats

As cyberthreats continue to evolve, it is crucial for higher education institutions and universities to be vigilant.  Enforcing security strategies prudently designed to safeguard digital…

4 minute read

Streamline identity management with a secure automated cloud solution by NetIQ Identity Manager by OpenText

Streamline identity management with a secure automated cloud solution by NetIQ Identity Manager by OpenText

OpenText™ Cloud Editions (CE) 24.1 introduces exciting updates and enhancements tailored for CE customers. Among these notable additions is NetIQ™ Identity Manager, a cloud-based solution…

2 minute read

‘Twas the night before Christmas… An OpenText Voltage Poem

‘Twas the night before Christmas… An OpenText Voltage Poem

‘Twas the night before Christmas, when all through the house A hacker was stirring, and clicking his mouse;  The stockings were hung by the chimney with…

4 minute read

Strengthening cyber resilience

Strengthening cyber resilience

Cyberattacks are on track to cause $10.5 trillion a year in damage by 2025. That’s a 300 percent increase from 2015 levels. A robust cybersecurity…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up