Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
Obtaining a bearer token to enable API interaction
OpenText™ Network Detection & Response (NDR), previously known as Bricata Network Detection & Response, provides real-time network visibility, metadata generation and threat detection. Additionally, it…
• 6 minute read
To upgrade, or not to upgrade…that is the question for enterprise software users
Upgrading a major software application can be challenging. Many factors come into play, including budget issues, downtime, upskilling the staff, and addressing software and automation…
• 5 minute read
OpenText Cybersecurity 2023 Global Managed Security Survey: Tool Consolidation is More Than a Trend, it’s a Demand
The impacts of a down economy are far reaching. Budget cuts, hiring freezes, and staff reductions are taking their toll on an already overstretched workforce….
• 2 minute read
Recover your systems and data from disaster with confidence
Having a disaster recovery plan is critical to your organizations’ success. When a critical system goes down, whether from ransomware or natural disaster – you’ll…
• 4 minute read
Dissecting IcedID behavior on an infected endpoint
IcedID, also known as BokDot, is a banking trojan that was first discovered in 2017. It targets a victim’s financial information and it is also…
• 4 minute read
The EnCase Evidence Viewer
OpenText™ EnCase™ Forensic software is one of the longest established digital forensic platforms on the market. It has been the primary tool of choice for…
• 3 minute read
Security Operations: Best Recent Reads
To help shed light on SecOps and the issues surrounding it, this blog post offers a roundup of some of the most insightful content published in various corners of our site.
• 4 minute read
Digital forensic device duplication – the next step
Digital forensic imaging is defined as the processes and tools used in copying a physical storage device for conducting investigations and gathering evidence. This copy doesn’t…
• 3 minute read
Simplify security through a scalable platform for MSPs and SMBs
Our Managed Service Provider (MSP) partners are important to us, and at OpenText Cybersecurity, we’re proud to provide you with the tools that make it…
• 3 minute read
Protect your “anywhere” workforce from web-based threats
The internet is part of everyday work life. Employees need to use the internet for countless work-related purposes, but without secure, private, and visible control…
• 3 minute read
Introducing the OpenText Tableau Forensic TD4 Duplicator
In today’s technology-centric world, more than 80% of the evidence collected in a criminal investigation includes the digital evidence contained on a laptop, computer or…
• 5 minute read
Ride the digital ecosystem wave, securely
Connected digital ecosystems are forecast to generate one-quarter of all global revenue by 2030 – 80 trillion USD1, and businesses are eager to get their…
• 3 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up