Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read
Strengthen information protection with a Zero Trust Information Governance program

Strengthen information protection with a Zero Trust Information Governance program

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” – Sun Tzu, The Art of War…

2 minute read

Smart PCAP: A time machine for the SOC

Smart PCAP: A time machine for the SOC

Anyone familiar with packet forensics or packet recording knows you can spend hours poring over bulk information and waiting for a response. With Smart PCAP,…

4 minute read

What we can learn from the ACC 2022 State of Cybersecurity Report

What we can learn from the ACC 2022 State of Cybersecurity Report

Recently, the Association of Corporate Counsel (ACC) Foundation, in collaboration with Ernst & Young, LLP, released the 2022 State of Cybersecurity Report, An In-house Perspective….

6 minute read

A good foundation is key to digital forensic investigations

A good foundation is key to digital forensic investigations

I was recently reading an article in Forbes Magazine about the importance of a good foundation when building a home. When we build a house, we…

4 minute read

G before S except after E and other rules to live by

G before S except after E and other rules to live by

2022 was both chaotic and transformative – a war in Ukraine, increased cyber-attacks, disrupted supply chains, an adjustment to work at home and new trust…

5 minute read

Top 10 network security best practices

Top 10 network security best practices

Network security is constantly evolving. To stay ahead of bad actors, follow these 10 best practices to reduce the risk of data compromise.  1. Review…

5 minute read

OpenText is a leader in Detection and Response

OpenText is a leader in Detection and Response

MITRE Engenuity released today the results of its first ATT&CK Evaluations for Managed Services. OpenText™ joins the top tier with an outstanding performance for its…

3 minute read

Technology meets tenacity

Technology meets tenacity

Technology alone won’t defeat cybercriminals. Effective cybersecurity isn’t something you buy off the shelf, set, and forget. To secure your data, you must be proactive,…

4 minute read

OpenText MxDR platform: a team player

OpenText MxDR platform: a team player

There’s a truism in the cybersecurity sector that says enterprise technology stacks are so large because the market demanded big-stack solutions. Convenience, fiscal constraints, and…

3 minute read

Stopping threats cold

Stopping threats cold

Imagine NFL football before Don “Red Dog” Ettinger changed the game by “blitzing” linebackers into the opposing team’s backfield, or hockey before Bobby Orr showed…

4 minute read

Why NDR is the latest 3-letter word in cybersecurity

Why NDR is the latest 3-letter word in cybersecurity

Network Detection and Response (NDR) is one of the latest acronyms to join the alphabet soup of information security and risk management tools. As we…

5 minute read

OpenText MxDR Platform: By the numbers

OpenText MxDR Platform: By the numbers

There’s one thing about data: it doesn’t lie. It’s either on or off, zero or one.  Data protection and threat remediation are like that, too….

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up