1 day ago

    Governments get cloud confident — and strategic

    1 day ago

    How utilities can boost engagement, retention, and profits

    1 day ago

    Location, location, location. Why asset tracking is hot property

    1 day ago

    Minimize clinical trial delays to bring life-saving therapies to market faster

    How to select the best endpoint security solutions in 2021
    Cyber Resilience

    How to select the best endpoint security solutions in 2021

    The thought that a chain is only as strong as its weakest link is something that can keep IT security…
    Why in-place preservation is critical to the litigation hold process
    Uncategorized

    Why in-place preservation is critical to the litigation hold process

    The continued increase of litigation and the growth in volume and variety of eDiscovery data was already challenging over-burdened legal…
    What’s new in OpenText Axcelerate
    eDiscovery

    What’s new in OpenText Axcelerate

    The latest announcement by OpenText of Cloud Editions includes some great updates to OpenText™ Axcelerate™. Check out the latest updates…
    What is content and document rationalization?
    Services

    What is content and document rationalization?

    Google Dictionary defines rationalization as “the action of making a company, process or industry more efficient.” At home, rationalization might…
    How to effectively deliver virtual training
    Services

    How to effectively deliver virtual training

    COVID-19 has significantly altered how we deliver and consume training. With companies moving to remote work, many employees are now…
    How to handle chat data in eDiscovery and investigations
    eDiscovery

    How to handle chat data in eDiscovery and investigations

    Water-cooler talk and quick chats in the office disappeared with the pandemic. But online chat—already a prevalent form of communication…
    Takeaways from the recent OpenText Core Content webinar
    Content Services

    Takeaways from the recent OpenText Core Content webinar

    If you attended the recent webinar, “Introducing OpenText™ Core Content, the next generation SaaS content services platform” then you are…
    Why you need a top digital experience platform in 2021
    Information Management

    Why you need a top digital experience platform in 2021

    The COVID-19 pandemic has accelerated a social and technology trend that has been happening for some time. The way we…
    Manufacturers unite: Driving safe operations, together
    Automotive & Manufacturing

    Manufacturers unite: Driving safe operations, together

    Among the turbulence and uncertainty created by the pandemic, there have been silver linings — unexpected, positive events that have…
    JBS Ransomware attack highlights need for early detection and rapid response
    Security

    JBS Ransomware attack highlights need for early detection and rapid response

    Over the past couple of months cyber-criminals have targeted organizations critical to our supply chain. The most recent of these…
    Enrich EIM solutions with business intelligence
    AI & Analytics

    Enrich EIM solutions with business intelligence

    Changing business priorities require your organization to focus on optimizing for efficiency to ensure positive impact to the bottom line.…
    Our commitment to protecting your content
    Content Services

    Our commitment to protecting your content

    What are the risks to your content? Do you know what kinds of information are at risk or the consequences…
    MITRE Engenuity’s ATT&CK R3
    Security

    MITRE Engenuity’s ATT&CK R3

    The highly anticipated results of MITRE Engenuity’s ATT&CK R3 Evaluations are now available. The third round of evaluations tested 29 Endpoint Detection & Response products…
    Top 5 differences between information assurance vs. cybersecurity
    Security

    Top 5 differences between information assurance vs. cybersecurity

    There are many ways to help safeguard sensitive and confidential information within an enterprise. Amongst the most popular are information…
    Better patient outcomes happen when you look beyond EMRs
    Healthcare & Life Sciences

    Better patient outcomes happen when you look beyond EMRs

    A patient is more than their symptoms and more than their medical records. Keeping that larger, human perspective in mind…
    Providing a superior experience for commercial banking customers
    Banking & Insurance

    Providing a superior experience for commercial banking customers

    The banking industry—which includes retail banks and credit unions, wealth and asset management firms, and corporate and treasury divisions—faces severe…
    RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan
    Security

    RIG Exploit Kits exploit Internet Explorer delivering Dridex Trojan

    The RIG Exploit Kit (EK), which was discovered in 2014, is known to exploit vulnerabilities in Microsoft’s Internet Explorer browser…
    Moving to SAP S/4HANA?
    News & Events

    Moving to SAP S/4HANA?

    Companies have been forced to drive digital transformation that would normally – without the heightened pressures of a pandemic –…
    NIST Privacy Framework – The Communicate function
    Services

    NIST Privacy Framework – The Communicate function

    In the first blogs, we focused on the Identify, Govern, and Control functions of the NIST Privacy Framework. In this…
    Back to top button