The Micro Focus Community

Sign in or register to tap into the vast knowledge pool of the community

REGISTER > SIGN IN >
Information and Key Links: Hey! Look!
Most "Liked" Contributors

Latest Blogs

Blog articles of interest across this community

Relationships Are the Key to a Successful Security Analytics Tool

The nature, scale, and diversity of the cybersecurity threats that the modern organization faces means leveraging the power of automated security tool...
in Security Blog an hour ago
0
0
13

UEBA: Don't be Fooled by False Positives!

The following is adapted from a November 2017 presentation (see slides, below) by Interset’s CTO Stephan Jou, who received an ICSIC accolade for penni...
in Security Blog yesterday
1
0
16

How Cybersecurity Can Leverage Big Data

In the age of digital transformation, big data is on a forward path in multiple aspects of enterprise operations, cybersecurity included. But what is ...
in Security Blog yesterday
0
0
34
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.