Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

The Micro Focus Community

Sign in or register to tap into the vast knowledge pool of the community

REGISTER > SIGN IN >
Most "Liked" Contributors

Latest Blogs

Blog articles and discussions of interest across the Community

Developing a prioritized security strategy

Congratulations! We are officially over the hump! In our last post, Addressing Governance and Regulatory requirements, we described the third of six p...
in Security Blog 6 hours ago
0
0
9

How AI turns CCTVs into round-the-clock guards

Security operators tasked with monitoring multiple camera feeds have a very challenging job simply because they are humans. No wonder the United Kingd...
0
0
71

Ensure Privacy Protection through your Digital Transformation - Secure what matters most

It is a priority for many leading enterprises in 2019. Now, more than ever, it is necessary for a company to adopt advanced technologies to gain that ...
in Security Blog yesterday
0
0
303
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.