Our vBulletin migration is complete.
Welcome vBulletin users! All content and user information from the Micro Focus Forums (vBulletin) site has been migrated to this site. READ MORE.

The Micro Focus Community

Sign in or register to tap into the vast knowledge pool of the community

Information and Key Links: Hey! Look!
Most "Liked" Contributors

Latest Blogs

Blog articles of interest across this community

Effective Vulnerability Risk Management--It Doesn't Have to be Complicated

With the summer solstice quickly fading into the rear-view mirror, we're reminded that we're nearly halfway through 2019 already. During these summer ...

What's New for Network Operations Management 2019.05?

At ITOM Summit, I delivered a presentation where I lauded our R&D team for their focus on product quality (nearly 500 defects repaired!) and improving...

Why enforce the principle of least privilege in your AD environment

The principle of least privilege is one of the most critical concepts to address as you construct a breach defense strategy. It is defined as the prac...
in Security Blog Tuesday
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.