0

    BOT Governance: How Digital Workers’ Identity can be Governed

    The NetIQ Suite offers a complete BOT Governance framework to govern BOTs (RPA/Non-RPA) including BOT ID Management, BOT Access Management & Certification, and BOTs Credential Management.
    by Micro Focus Employee in CyberRes
    0

    DevSecOps with Public Cloud Providers: Automated security testing with Oracle Cloud Infrastructure (OCI) DevOps

    Our new AppSec blog talks about a DevSecOps solution that can be integrated with Oracle Cloud Infrastructure CI/CD.
    by Micro Focus Employee in CyberRes
    0

    Fortify Employee Spotlight: Jammin’ with Jan

    Our latest Fortify Employee Spotlight highlights Jan Wienand, Security PreSales Consultant for CyberRes. Jan supports enterprise customers as well as small and medium-sized companies from the DACH region in exciting application security projects.
    by Micro Focus Employee in CyberRes
    0

    ML and AI: Key Technology to Elevate Cybersecurity for the Digital Age

    Machine learning (ML) and artificial intelligence (AI) have emerged as a key technology to elevate cybersecurity for the digital age.
    by Micro Focus Employee in CyberRes
    0

    Reimagining Cyber Podcast: Inside Cybercrime with Raveed Laeb

    Raveed Laeb, Vice President of Product for KELA, a cyber intelligence technology company, gives us a behind-the-curtain view of the world of cybercriminals in the latest Reimagining Cyber podcast, “Inside cybercrime with Raveed Laeb.”
    by Micro Focus Employee in CyberRes
    0

    SAST 101: The What, Why, and How of Static Testing

    What is SAST, what are its strengths and weaknesses, and how do SAST and DAST work together? Find out in this new AppSec blog.
    by Micro Focus Employee in CyberRes
    0

    Cyber Insurance – Customers Need to Be More Cyber Resilient

    Cyber insurance brokers must play an active role in ensuring those seeking to be insured have adequate cybersecurity controls, such as multi-factor authentication (MFA), to mitigate cyber risk and reduce the likelihood of claims.
    by Micro Focus Employee in CyberRes
    0

    How Not to Be the Next Victim of Insider Attacks

    Two out of three companies are experiencing 20+ insider-related incidents per year. See how NOT to be the next victim of insider threats!
    by in CyberRes
    0

    Willful Security Ignorance: Are You Exposed to Old Vulnerabilities?

    Using older vulnerabilities is common practice among attack groups, a trend that companies should take into account as they triage and remediate software vulnerabilities. In some cases, organizations did not prioritize the vulnerability properly, allowing attackers to exploit the security weakness. In other cases, organizations may not have even known that they had a vulnerable asset.
    by Micro Focus Employee in CyberRes
    0

    You Already Know What Zero Trust Is, but Might Not Realize It

    Zero Trust is not a new concept, but the name may be. Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction. But Zero Trust also is used in the physical world and has be seen, although perhaps not noticed, in action by anyone who has travelled through an airport.
    by Micro Focus Employee in CyberRes