Building a threat hunting team

Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.

September 3, 2024 5 minute read
Building trust in AI: Key strategies for data protection and ethical use 

Building trust in AI: Key strategies for data protection and ethical use 

Artificial intelligence (AI) has become an everyday buzzword, and for good reason: it’s significantly changing the way businesses operate and thrive. AI tools are proving…

3 minute read

How threat hunters stay informed and collaborate 

How threat hunters stay informed and collaborate 

In the ever-evolving landscape of cybersecurity, threat hunters play a crucial role in proactively detecting and mitigating security threats. To do this, they need to stay informed and effectively collaborate.

6 minute read

IDC MarketScape names OpenText a leader in intelligent digital asset management

IDC MarketScape names OpenText a leader in intelligent digital asset management

Digital asset management systems have rapidly evolved

2 minute read

Understanding threat hunter personas

Understanding threat hunter personas

Threat hunter personas bring the threat hunter to life and help communicate the important needs of threat hunters to the organizations that support them.

7 minute read

OpenText Analytics Database: The ELT Advantage

OpenText Analytics Database: The ELT Advantage

Understand how OpenText Analytics Database (Vertica) revolutionizes data management by enhancing the ELT process, offering superior speed, scalability, and analytical power.

3 minute read

Information reimagined for the energy industry 

Information reimagined for the energy industry 

The global race for energy will require elevating the human potential across the entire industry

3 minute read

Harnessing the Power of ELT for Real-Time Data Processing

Harnessing the Power of ELT for Real-Time Data Processing

Explore the capabilities of ELT (Extract, Load, Transform) in managing and processing real-time data, transforming the way businesses leverage instant analytics for decision-making.

2 minute read

Top three challenges of threat hunting

Top three challenges of threat hunting

Our series on threat hunters has covered what they are and what they do. This week’s post highlights two common mistakes threat hunters make and…

5 minute read

How to decide between ETL and ELT for data management needs

How to decide between ETL and ELT for data management needs

Navigating the decision between ETL and ELT can be complex. Discover the factors that influence this choice and how to select the best approach for your data strategy.

2 minute read

Threat hunters – A day in the life

Threat hunters – A day in the life

Threat hunting is not just a job; it’s a commitment to staying one step ahead of cyber adversaries. In this post, we’ll dive into the…

6 minute read

Raise the Bar on Your Software Delivery Game: OpenText’s DevSecOps MVPs Take the Gold

Raise the Bar on Your Software Delivery Game: OpenText’s DevSecOps MVPs Take the Gold

It’s time to level up your software delivery game with OpenText’s DevSecOps dream team.

5 minute read

Three key aspects of being a threat hunter  

Three key aspects of being a threat hunter  

In today’s digital landscape, the role of a threat hunter has become indispensable. As cyber threats grow increasingly sophisticated, the need for professionals who can…

5 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.

Sign up