Security
The new wave of channel marketing: What partners can expect in H2 2024
We’re well into 2024 now and the channel marketing landscape continues to change, thanks to a blend of innovation and connectivity. At OpenText™, we’re not…
Why NDR is the latest 3-letter word in cybersecurity
Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we…
OpenText MxDR Platform: By the numbers
There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one. Data protection and threat remediation are like that, too….
Cut the noise. Cue the results.
If you faced a worker shortage, wouldn’t it make sense to optimize the time of the employees you do have? According to the latest report…
The human dimension of cybercrime
It’s called cybercrime, but humans are at its core, and understanding how they operate is essential for combatting their actions. While traditional cybersecurity tactics focused…
Curbing Insider Threats Today Requires a Holistic Approach
October is Cybersecurity Awareness Month. It’s important to exercise sound cybersecurity best practices to protect your organization’s sensitive and valuable information against outside hackers and…
Apple property list parsing with EnScript
The third blog in the series following on from Using the Generic SQLite Database Parser EnScript in forensic examination of a mobile device, will focus…
OpenText Security eliminates digital blind spots with enhanced threat detection, investigation and response capabilities
Cyber attackers, insiders seeking to use confidential and sensitive information to their advantage, and criminals lurk everywhere – on endpoints, both on and off network,…
Targeted DFIR evidence collections
During or after an incident, there may be a need for forensic analysis on the endpoints involved in a breach or compromise. This blog discusses…
Using the Generic SQLite Database Parser EnScript in forensic examinations of a mobile device
In my previous blog, the use of EnScript was introduced as a benefit to extend the artifact reach and add custom parsing for the yet…
Network security: from reactive alerts to proactive threat hunting
In any security-minded organization, there are three ways to prevent or mitigate threats beyond firewalls, passwords or locks. Imagine defending your network as you would…
Mobile device examination with EnCase
Anyone engaged in DFIR (Digital Forensics & Incident Response) will recognize and understand the field moves and evolves at a rapid rate. There is always…
NetSupport Remote Access Trojan (RAT) delivered through fake browser updates by SocGholish threat actors
The SocGholish campaign is suspected to be linked to the Russian threat actor known as “Evil Corp”. The threat actors are known to drop HTML…
Stay in the loop!
Get our most popular content delivered monthly to your inbox.