Security
Equipping threat hunters: Advanced analytics and AI part 1
As cyber threats grow more sophisticated through AI-powered malware, zero-day exploits, and state-sponsored attacks, organizations face an increasing challenge in safeguarding their digital assets. The…
Increase security with customer-managed encryption
Organizations need a secure path to the cloud in a Zero Trust world. Concerns over security can be a barrier for organizations transitioning to cloud-based solutions….
• 3 minute read
Enabling collaboration in digital forensic investigations
A customer recently told me they could be at search warrants every day of the year and never make a dent in their case load. That’s…
• 4 minute read
Partnering with law enforcement to protect children
Forty one years ago this week, Adam John Walsh was abducted from a Florida department store and murdered at just six years old. As an outcome…
• 4 minute read
Modernizing data collection with OpenText EnCase Information Assurance
In today’s digital world, business communications are evolving, and organizations are adapting to new modern work environments. Historically, data was located primarily on in-house workstations…
• 4 minute read
Managing the threat from within: How organizations and law firms are bolstering security postures to protect sensitive data
The rapid growth of digital communications has affected every industry and vertical, creating increasingly document-intensive operations and the need to address vulnerabilities in security and…
• 4 minute read
Turn up the volume with Table Top Exercises
MITRE released a new edition of its book on “the way security operations is done”, 11 Strategies of a World-Class Cybersecurity Operations Center. The book…
• 3 minute read
Building a cyber resilient and safer world
Join us for the Security Cloud Track at OpenText World EMEA 2022 As organizations continue to transform and recover from the pandemic, security teams must…
• 3 minute read
The growing need for digital forensic investigators
The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a…
• 5 minute read
Dissecting Netwire Remote Access Trojan (RAT) behavior on an infected endpoint
Netwire is a Remote Access Trojan (RAT) capable of stealing passwords, keylogging, and includes remote control capabilities. Netwire RAT has been used by advanced persistent…
• 2 minute read
The superman of digital investigations
Meet the new and improved OpenText EnCase Forensic Recently, we’ve been talking about the evidence processing performance of OpenTextTM EnCaseTM Forensic and how it stacks…
• 6 minute read
Enabling Security Partners on MxDR Services
OpenText offers exciting opportunities for resellers, technology providers and service organizations to capture their share of the multi-billion US$ Information Management (IM) and Cybersecurity markets…
• 2 minute read
Accelerating the pace of digital forensic investigations
Part two In a previous blog post, I shared some information that showed OpenTextTM EnCase Forensic processing evidence significantly faster – in this case 33%…
• 4 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.
Sign up