Security

Equipping threat hunters: Advanced analytics and AI part 1

As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…

September 17, 2024 6 minute read

Increase security with customer-managed encryption

Organizations need a secure path to the cloud in a Zero Trust world. Concerns over security can be a barrier for organizations transitioning to cloud-based solutions….

3 minute read

Enabling collaboration in digital forensic investigations

A customer recently told me they could be at search warrants every day of the year and never make a dent in their case load. That’s…

4 minute read

Partnering with law enforcement to protect children

Forty one years ago this week, Adam John Walsh was abducted from a Florida department store and murdered at just six years old.  As an outcome…

4 minute read

Modernizing data collection with OpenText EnCase Information Assurance

In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…

4 minute read

Managing the threat from within: How organizations and law firms are bolstering security postures to protect sensitive data

The rapid growth of digital communications has affected every industry and vertical, creating increasingly document-intensive operations and the need to address vulnerabilities in security and…

4 minute read

Turn up the volume with Table Top Exercises

MITRE released a new edition of its book on “the way security operations is done”, 11 Strategies of a World-Class Cybersecurity Operations Center. The book…

3 minute read

Building a cyber resilient and safer world

Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must…

3 minute read

The growing need for digital forensic investigators

The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a…

5 minute read

Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint

Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…

2 minute read

The superman of digital investigations

Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM Forensic and how it stacks…

6 minute read

Enabling Security Partners on MxDR Services

OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…

2 minute read

Accelerating the pace of digital forensic investigations

Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster – in this case 33%…

4 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up