Micro Focus (now OpenText) Community
Micro Focus (now OpenText) Community
  • Site
  • User
  • Site
  • Search
  • User
Micro Focus (now OpenText) Community
  • Blogs
  • Ask & Explore
  • Community Guide
  •  

    Menu

    ×
  1. Welcome

      Welcome

      ×
    1. Getting Started Guide
    2. Knowledge Partner Program
  2. Application Delivery Management

      Application Delivery Management

      ×
    1. AccuRev
    2. Agile Manager
    3. ALM / Quality Center
    4. ALM Octane
    5. Business Process Testing
    6. Deployment Automation
    7. Dimensions CM
    8. Dimensions RM
    9. LoadRunner Cloud
    10. LoadRunner Enterprise
    11. LoadRunner Professional
    12. Micro Focus Connect
    13. Project and Portfolio Mgmt.
    14. PulseUno
    15. PVCS Version Manager
    16. Release Control
    17. Requirements Management
    18. Service Virtualization
    19. Silk Central
    20. Silk Performer
    21. Silk Test
    22. StarTeam
    23. UFT Developer
    24. UFT Mobile
    25. UFT One
  3. Application Modernization & Connectivity

      Application Modernization & Connectivity

      ×
    1. AMC-INTL
    2. ChangeMan SSM
    3. ChangeMan ZMF
    4. COBOL Analyzer
    5. Comparex
    6. Enterprise Analyzer
    7. Enterprise Developer
    8. Enterprise Server
    9. Enterprise Test Server
    10. Extend / AcuCOBOL
    11. Extra!
    12. Host Access for the Cloud
    13. Host Access Mgmt/Security Server
    14. Micro Focus and AWS Partnership
    15. Net Express / Server Express
    16. Network Virtualization
    17. OpenFusion
    18. Orbacus
    19. Orbix
    20. Reflection
    21. RM/COBOL
    22. Rumba
    23. StarTool
    24. Verastream
    25. VisiBroker
    26. Visual COBOL
  4. CyberRes

      CyberRes

      ×
    1. CyberRes User Group
    2. ArcSight
    3. File Analysis Suite
    4. File Dynamics
    5. File Reporter
    6. Fortify
    7. Galaxy
    8. NetIQ Access Manager
    9. NetIQ AD Bridge
    10. NetIQ Advanced Authentication
    11. NetIQ Change Guardian
    12. NetIQ Data Access Governance
    13. NetIQ Directory & Resource Administrator
    14. NetIQ eDirectory
    15. NetIQ Group Policy Administrator
    16. NetIQ Identity Governance
    17. NetIQ Identity Manager
    18. NetIQ LDAP Proxy
    19. NetIQ Privileged Account Manager
    20. NetIQ Risk Service
    21. NetIQ Secure API Manager
    22. NetIQ Secure Configuration Manager
    23. NetIQ SecureLogin
    24. NetIQ Security Solutions for IBM i
    25. NetIQ Self Service Password Reset
    26. NetIQ Validator
    27. SecureData
    28. SecureMail
    29. Sentinel
    30. Structured Data Manager
    31. Voltage
  5. Information Management & Governance

      Information Management & Governance

      ×
    1. Content Manager
    2. ControlPoint
    3. Data Protector
    4. eDiscovery
    5. IDOL
    6. Retain
    7. Storage Manager
    8. VM Explorer
  6. IT Operations Management

      IT Operations Management

      ×
    1. Aegis
    2. AppManager
    3. Asset Management
    4. Client Automation
    5. Data Center Automation
    6. Hybrid Cloud Management
    7. Hybrid Cloud Management X
    8. Network Operations Management (NNM and Network Automation)
    9. Operations Bridge
    10. Operations Center
    11. Operations Orchestration
    12. OPTIC (ITOM Platform)
    13. PlateSpin
    14. Robotic Process Automation
    15. Service Management Automation
    16. Service Request Center (SRC)
    17. Service Support Manager (SSM)
    18. SMA-Service Manager Suite
    19. SMAX Suite
    20. Solutions Business Manager
    21. Storage Operations Manager
    22. Universal Discovery & CMDB
  7. Team Collaboration and Endpoint Management

      Team Collaboration and Endpoint Management

      ×
    1. Connected Backup
    2. Filr
    3. GroupWise Products
    4. iPrint
    5. Open Enterprise Server
    6. Vibe
    7. ZENworks
  8. Control Tower
  9. Micro Focus Marketplace
  10. News from Support
  11. Technical Insights Series
  • User
  • Site
  • Explore Community
  • User
    CyberRes
    Community Home › CyberRes › CyberRes News & Events

    CyberRes

    • Home
    • Blogs
    • News & Events
    • New
    • Security News & Events
    • #GartnerSEC: Five Steps to Ensuring Board Engagement
    • "Best Application Security Award" - Reader's Choice Awards Winners 2022 | CybersecAsia
    • "Faire face aux attaques de Ransomwares" (in French)
    • "Go For Micro Focus If You Are Looking For Access Management Solution", Gartner Peer Insights
    • "Mobile App Vulnerabilities – The Bad, the Worse and the Ugly,” Huntsville, AL, June 3
    • "Our mission and passion is to help our customers become more resilient": CyberRes exec - ITP.net
    • (German Cyber Security Research Study) IT-Sicherheit 2020: Wo Security einen neuen Kurs braucht
    • (ISC)² Secure Summit EMEA, 15-16 APRIL 2019 | WORLD FORUM, THE HAGUE
    • 10 trends shaping the security industry in 2021
    • 10-min online course: A Layered Approach to Insider Threat Prevention
    • 11 Top Cybersecurity Trends To Watch For At Black Hat 2019
    • 11. Februar 2021: Micro Focus DevSecOps Day - Nehmen Sie online teil! (in German)
    • 15 Tech Pros On The Best IoT Applications On The Market Right Now
    • 16 Tips For Ensuring Your Team Keeps Up With Software And Security Updates
    • 17 open-source container security tools
    • 1er Observatoire DevSecOps 2019...
    • 2 Phishing-Related Health Data Breaches Grow Even Bigger
    • 2,7 miljoner inspelade samtal till 1177 helt oskyddade på internet (in Swedish)
    • 2019 could be a record-breaking year for data breaches – DXC Blogs
    • 2019 Cybersecurity Product Awards - Winners and Finalists - Cybersecurity Excellence Awards
    • 2019 data breach disclosures: 10 more of the biggest
    • 2019 State of Security Operations Update, eBook
    • 2019 was a hot mess for cybersecurity, but 2020 shows promise
    • 2019-03-26-SoCal OptivCon, Huntington Beach, March 26
    • 2020 Cybersecurity Predictions by 50 Industry Leaders | Information Security Buzz
    • 2020 Cybersecurity Trends to Watch
    • 2020 DevSecOps Days- At RSA in San Francisco
    • 2020 State of Security Operations
    • 2020 visions - predictions for the cyber-security industry in the year ahead
    • 2021 AFCEA TechNet Augusta Conference and Expo, Aug. 16-19
    • 2021 CyberMaryland Conference, March 24-25
    • 2021 Gartner Peer Insights 'Voice of the Customer' Report for SIEM
    • 25 data security stats that matter
    • 27 nations ink cybersecurity pledge
    • 3 Takeaways on Micro Focus Culture from an Security, Risk & Governance Marketing Intern
    • 3 ways COVID-19 is changing CISO priorities
    • 30 Million Dell Devices Have Preinstalled Software With ‘Severe’ Security Flaws
    • 30 years into the web, Sir Tim vents on scams, hacks and hate
    • 30 years of security awareness: 11 lessons learned
    • 31 cybersecurity stats that matter
    • 32 application security stats that matter
    • 4 container security trends that matter to your CI/CD
    • 4 Kubernetes security challenges and how to address them
    • 4 technology leadership lessons for the coming post-pandemic world
    • 4 ways remote work has changed DevSecOps
    • 4 ways to build a better security culture
    • 4 ways to secure your code regardless of programming language
    • 42 More Cybersecurity Predictions For 2020
    • 48% of UK organisations have a basic cybersecurity skills gap
    • 5 considerations for cloud migration, from a Hill CISO
    • 5 Critical Questions Raised by Water Treatment Facility Hack
    • 5 Cybersecurity Myths Banks Should Stop Believing
    • 5 keys to securing multi-cloud environments
    • 5 maneras en que DevSecOps puede gestionar las cadenas de suministro de software
    • 5 security operations and analytics trends to watch in 2020
    • 5 ways to build in cyber resilience with intelligent threat operations
    • 5 ways to ensure your applications are cyber resilient
    • 5 ways to make your serverless functions more secure
    • 5 ways to manage serverless secrets, ranked best to worst
    • 52% of Indian firms report cyber attack in last 12 months
    • 6 Cybersecurity Trends and Events 2021 | Debricked
    • 6 Part series - Breach Defense: Part 1 - Anatomy of a Breach
    • 65,000 attempted data breaches a day, is lockdown home working to blame?
    • 8 open-source Kubernetes vulnerability scanners to consider
    • 8 lessons from the Garmin ransomware attack
    • 8 Takeaways: Black Hat Europe's Closing 'Locknote' Panel
    • 9 disruptive security plays from RSAC 2019
    • 93 Per Cent Of Global Security Teams Use AI And Machine Learning Tools To Detect Advanced Threats
    • 95,000 Delawareans impacted in data breach that lasted nearly nine years
    • A Casino Gets Hacked Through a Fish-Tank Thermometer
    • A CISO Plan of Action Against Hafnium’s exploitation of Microsoft Exchange Vulnerabilities
    • A Guide to Insider Threats and How to Prevent Them
    • A Look Towards the Future of a Remote Workforce
    • A Modern CISO’s response to Sunburst
    • A más velocidad de desarrollo, más exigencias de seguridad
    • A new problem for Peloton owners: Hacks
    • A Policy to include the cloud
    • A Python Vulnerability Could Allow Remote Code Execution Attacks
    • A Summer of Data Breach Discontent
    • A third of IDC survey respondents say they’ve been victims of ransomware or breach
    • A Wake-Up Call for CIOs
    • Accelerate repeatable tasks with Security Automation
    • Accelerate time to market with the right security solutions
    • Accelerated Growth in Times of Adversity
    • Access control: Pandemic forces rethink of IT’s trust model
    • Access Health reports over 1,000 consumers’ information compromised in data breach
    • Account Management is a Winner for CyberRes at Micro Focus in FY21’RQ2
    • Acor Choses NetIQ to reduce its workload by automating account management
    • Addressing Governance and Regulatory requirements
    • Advanced analytics put Jaguar Racing Formula E on pole - Tech Monitor
    • AFCEA Bethesda December Breakfast Webinar: Paper Security vs. Real Security, Dec 9
    • AFCEA Bethesda February Breakfast Webinar: Modern Security Landscape, Feb 23
    • AFITC 2020 conference, Aug 24 - 27
    • AI and Cybersecurity
    • AIOps in the enterprise: 6 trends to watch in 2021
    • Aktualisiert : Software Tipps zur Coronavirus Pandemie--Heise
    • Alex Ramirez over databeheer en privacy, Micro Focus Universe, van 17-19 maart in Den Haag
    • Almost entire population of Ecuador has data leaked
    • Aluminum giant Norsk Hydro Hit by Ransomware Cyberattack
    • America’s Need For Cyber Resilience
    • Analyst Series, Cybersecurity - TechTalk Summits, June 1
    • Analytics, machine learning e IA nella sicurezza di Micro Focus | 01net
    • Android maker Gigaset injects malware into victims' phones via poisoned update 
    • Angelbeat technical workshops: Microsoft, Cloud, Security, WiFi, Analytics - various AMS cities
    • Announcing the New Application Security Training Program
    • Anonymous tweets ‘DDoS’, everyone freaks out
    • API security becomes a ‘top’ priority for enterprise players
    • APIs: Securing the Stitching Connecting Applications
    • Applying RSA’s “Better Security” theme to Your Digital Transformation Initiatives
    • AppSec Village Sandbox | RSA Conference | June 7-9, 2022
    • April 2019 | Micro Focus Education Bits & Bytes
    • ArcSight eases the pain of talent shortage with SOAR acquisition
    • ArcSight Technical Enablement Session, Sydney, 16-20 September, 2019
    • ArcSight User Group Meeting - ArcSight SIEM as a Service - February 17
    • ArcSight User Group Meeting - September 28 - REGISTER NOW!
    • ArcSight User Group Meeting - Tuesday, June 29
    • ArcSight User Group presentations 2017, Frankfurt a.M.
    • ARE YOU A SECURE CODE WARRIOR? Join Secure Coding Tournament May 18th through May 20th to find out
    • Are you part of the 95% who needs better understanding of the Data Privacy technology requirements?
    • Arizona Security Local User Group Event
    • ARMA NYC Spring Conference, March 5
    • ARMA Spring Conference Houston speaking Session, April 23
    • Artikel - New Business Radio: HOE 'SECURE' IS HET ONDERWIJS? (in Dutch)
    • As the threat rises, so too does Kanata North’s cybersecurity industry
    • ASEAN NetIQ User Group Meeting, 8 July 2021
    • AT&T employees took $1M in bribes from phone-unlock gang
    • Atlanta Vivit Security User Group Event - How Best to Leverage Micro Focus Fortify
    • Atlantic Security Conference: The Payments Ecosystem - Security Challenges in the 21st Century, 4/25
    • Attack sophistication means health care cybersecurity requires digital resilience
    • Audit Finds More Security Vulnerabilities at IRS
    • Audit Identifies Australian Health Sector Security Weaknesses
    • August Security Engage customer newsletter
    • Australian consumers vulnerable risk of data breaches grows
    • Australian tech unicorn Canva suffers security breach | ZDNet
    • Automate your app sec testing to avoid getting bit
    • Automated Testing Use Cases
    • Automatisiertes IAM von Micro Focus liefert entscheidende Vorteile
    • AWS Public Sector Summit | Ottawa, May 15
    • AWS Public Sector Summit | Ottawa, May 15 (1789988)
    • AWS reInvent | November 30 - December 3, 2021 | Las Vegas or Virtual
    • BA customers given the green light for class-action lawsuit over 2018 data breach | Computing
    • Banner Health agrees to $6 million settlement over 2016 breach
    • Best of TechBeacon 2020: Security
    • Beware the Hardware that Implements Cryptography
    • Beyond XDR: The New Frontier - InformationWeek
    • Biden Budget Seeks to Invest Billions in US Cybersecurity
    • Biden signs executive order to improve government response to cyberattacks
    • Biggest 2019 data breaches: Some of the worst of the worst - Security Boulevard
    • Biggest 2019 data breaches: Some of the worst of the worst - Security Boulevard (2751963)
    • Biggest Data Breach Fines and Settlements in 2019
    • Billions of records have been hacked already. Make cybersecurity a priority or risk disaster
    • Black Hat MEA | Saudi Arabia | November 15 - 17
    • Black Hat 2019 in Las Vegas, Aug. 7-8
    • Black Hat Speaking Session: SSO Wars: The Token Menace, Aug 7
    • Black Hat USA 2022 | August 6-11 | Mandalay Bay / Las Vegas
    • Black Hat USA Speaking Session: Flip the Script: Pivot to Cyber Resilience, July 31-Aug 5
    • Black Hat USA, Jul 31 - Aug 5
    • BlackHat Session White Paper: Scribbling Outside the Lines of Template Security
    • BMW Customer Success Story-Strong authentication for the agile enterprise (Available also in German)
    • BOARDROOMS SEEK WELL-ROUNDED APPROACH TO CYBERSECURITY AND PRIVACY
    • Boosting User Adoption for Fortify & ArcSight Security Operations Software
    • Brookhaven National Lab Cyber Tech Day, Feb 25
    • BSide Columbus InfoSec Conference Speaking Session on Mobile App Vulnerabilities, March 1
    • Bugs Allowed Hackers to Dox John Deere Tractor Owners
    • Build unbreakable apps
    • Build your cybersecurity A-team: 7 recruiting tips
    • Building a resilient approach to remote working
    • Building stronger multicloud security: 3 key elements
    • Business Tech Trends of 2023
    • California Consumer Privacy Act (CCPA) Lookbook
    • California Modifies Consumer Privacy Regulations - Again
    • Can a universal policy strategy solve all your security headaches?
    • Can Artificial Intelligence Truly Enhance Cybersecurity and our Ability to Adapt to Threats?
    • Canada-East Virtual Cybersecurity Summit - Data Connectors, May 28
    • Canada-West Virtual Cybersecurity Summit - Data Connectors, July 16
    • Capital One hit with $80 million fine following 2019 data breach
    • Características para hacer frente a las principales amenazas (article in Spanish)
    • Carahsoft Reception at RSA Public Sector Day
    • Careers at Micro Focus | Micro Focus Job Opportunities
    • Careers at Micro Focus | Micro Focus Job Opportunities (2811881)
    • Carolinas Virtual Cybersecurity Summit - Data Connectors, July 9
    • Case Study: Fonterra
    • Case study: Kuwait Finance House Uses ArcSight for Advanced Breach Defense
    • Catch Bad Guys with Math at the Micro Focus Cybersecurity Summit
    • Cdiscount : commentaire Micro Focus (article in French)
    • Celebrate Groundhog Day with Micro Focus and Discover a Better approach to Unstructured Data
    • Central Ohio InfoSec Summit Session: “Shift Left – Building Security into the AppDev lifecycle
    • Central Ohio InfoSec Summit, Columbus, Ohio, May 23rd/24th
    • Changes in Cybersecurity (Part 2)
    • China eats NSA's lunch, uses its zero-days for a year
    • Chronique Presse – Qui est en tête de la course aux données ?
    • CIOs welcome Popi for enforcing data protection - TechCentral
    • CIO’s Atlas: Is your CIO a Mad-Man or Ant-Man?
    • CISA director unveils cyber defense collaborative center for pre-attack planning
    • CISA predicts cyber EO will drive progress on zero trust -
    • CISA releases new ransomware self-assessment security audit tool
    • Cisco clueless about security, apparently: Meet Thrangrycat
    • CISOs burdened by unhealthy stress levels, survey study finds
    • CISOs face a range of cybersecurity challenges in 2020
    • CISOs value peer advice most when researching cyber solutions
    • City of Albany Latest Local Government Hit With Ransomware
    • Close your cybersecurity skills gap with untapped talent
    • Cloud misconfigurations and security: 5 ways to avoid your next fail
    • Cloud Provider PCM Suffers Data Breach
    • Cloud providers step up security tools: Are they up to the job?
    • Cloud – mit Sicherheit: Micro Focus beim Cyber Crime Forum in Salzburg, 28.11.2019
    • Cloud-Native Application Security - DZone Refcards #375
    • Clubhouse Data Leak - 1.3M SQL Database Leaked Online
    • Collaborating successfully to earn consumer trust and supply safe infant milk around the world
    • Combining Three Pillars Of Cybersecurity Security - Forbes
    • Coming Soon: New/Updated Micro Focus Portals for Customer Support and Software Downloads
    • Companies May Be Flagging Themselves For Hackers By Buying Cybersecurity Insurance
    • Complete a Gartner Peer Insights Survey for MF Privileged Account Manager
    • Complete a Gartner Peer Insights Survey for Micro Focus SIEM Solutions
    • Complete this DevSecOps survey for a chance to win a Nespresso coffee machine
    • Compliance as a Service: A GCA and CyberRes Roundtable Discussion | January 18th | 2:00PM EST
    • Computer science degrees: Still relevant but not required
    • Computerwoche: Cloud Security - Corona zeigt gnadenlos die Schwächen auf (article in German)
    • Con la tecnología de Micro Focus hemos logrado ser más productivos y competitivos' (in Spanish)
    • Conference IDC - Gouvernance de la donnée- Paris, 6 juin 2019 - sécurité et automatisation
    • Conference: OptivCon Chicago | October 19th
    • Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach
    • Conférence IDC « Gouvernance de la donnée : Sécurité et automatisation
    • Congratulations to the Digital Transformation Innovation Award winners announced at Universe!
    • Congreso ASLAN2021 - 2 y 3 de junio, Madrid
    • Connect Converge: For Auto Makers, Data is the New Fuel
    • Connected car data targeted: How data security drives innovation
    • Content from the latest ASEAN Virtual NetIQ User Group is now ready for viewing!
    • Coronavirus: Cyber Threats On the Rise Amid Outbreak
    • Coronavirus: Its Four Most Prevalent Cyber Threats - Security Boulevard
    • COS e MicroFocus, alleanza distributiva sotto il segno della cybersecurity (article in Italian)
    • Cost of a Data Breach: Climbing Toward $4 Million
    • Covid-19 ha estimulado a migrar las operaciones de seguridad a la nube
    • Covid-19, la qualité des applications mobiles plus critique que jamais (in French)
    • COVID-19: CISOs Take on More Security, Privacy Challenges
    • Creating a WebInspect API Client (2019) - YouTube video
    • Credit cards, addresses and phone numbers vulnerable: More than 1 million customers’ privacy at risk
    • Criminals hacked the "Sesame Street" store, stole credit card info
    • Cross-Site Scripting (XSS) Web Attack (Live Demonstration for AppSec) - YouTube video
    • Cross-site scripting: How to go beyond the alert
    • CrowdStrike Fal.Con Cybersecurity Speaking Session: Hunting for the Insider Threat, Oct 15
    • CSA CloudBytes Connect Session: Secure Cloud Migration, Feb 4
    • Currency Exchange Travelex Held Hostage by Ransomware Attack
    • Customer Case Study: Coca-Cola FEMSA turned to Fortify on Demand
    • Customer Case Study: Medica
    • Customer Case Study: Sauter
    • Customer Case Study: See why Dubai Electricity and Water Authority chose ArcSight
    • Customer Case Study: St. Mary Mackillop College Canberra
    • Customer Success Story - Helbako and ZENworks
    • Cyber Hygiene: Keeping Ahead of the Game with Micro Focus
    • Cyber resilience and machine learning – The perfect partnership
    • Cyber Resilience and the Speed of Change
    • Cyber Resilience Assessment - identify your gaps!
    • Cyber Resilience Everywhere
    • Cyber Resilience Fireside Chat - Recorded
    • Cyber Resilience Fireside Chat, Jan. 26
    • Cyber Resilience Fireside Chat: Securing the Software Supply Chain, April 6
    • Cyber Resilience Highlights at Universe
    • Cyber Resilience Is a Must Have in the Next Normal According to IDC
    • Cyber Resilience Is Essential for Successful Digital Transformation
    • Cyber Resilience Is Essential for Successful Digital Transformation, by John Delk, General Manager
    • Cyber Resilience Track Agenda—Universe 2021
    • Cyber Resilience-the key to sustained business growth
    • Cyber resilience: It's not a product or a service—it's a mission
    • Cyber Resilience: Was ist, wenn Cyber Security nicht mehr ausreicht? (article in German)
    • Cyber resilience: What it is, why it matters—and how to get started
    • Cyber Resiliency through Micro Focus
    • Cyber Resilient Maturity Model
    • Cyber Resilient Maturity Model: Which stage are you on your Cyber Security journey?
    • Cyber Security Architect job in Newbury, Berkshire, United Kingdom | Software Engineering & IT jobs
    • Cyber Security Conference | Singapore, April 21-23, 2020
    • Cyber Security For Energy and Utilities Digi-Conference, 2-3 March
    • Cyber Security Sales Graduate Program | Sales & Marketing jobs at Micro Focus
    • Cyber Security: Keeping Ahead of the Game with Micro Focus, March 14
    • Cyber Threats to Gamers Are on the Rise - CPO Magazine
    • Cyber-Resilienz: Technologien und Ansätze (auf Deutsch - in German)
    • Cyberattack shuts down La Porte County (Indiana) government | SC Media
    • Cyberattacks crushing non-profit provider finances, as massive incidents rise
    • Cyberattacks: Top 5 Ways You Could Be Hacked in 2020
    • CYBERCOM Seeks ‘Hunt Forward’ Funding Boost
    • Cybercrime: 12 Top Tactics and Trends, Europol Describes Latest Cyber Threats
    • CyberRes 2021 State of Security Operations
    • CyberRes Engage Newsletter - August 2021
    • CyberRes Engage Newsletter - July 2021
    • CyberRes Engage Newsletter - June 2021
    • CyberRes Engage Newsletter - May 2021
    • CyberRes Engage Newsletter - September 2021
    • CyberRes Fireside Chat: Threat Hunting - Tuesday, September 21st | 11:00 a.m. - 12:00 p.m. EDT
    • CyberRes is a Gold Sponsor at fal.con 2022 | September 19 - 21 | Aria Resort & Casino, Las Vegas
    • CyberRes MSSP Partners Get New Program Supporting All Product Lines
    • CyberRes Radio: Addressing the Right Approach when Moving from Cyber Security to Cyber Resilience
    • CyberRes Receives ISO Certification for Entire SaaS Portfolio
    • CyberRes Reveals Digital Value Chain Attacheds on Rapid Rise...
    • CyberRes sera présent au FIC à Lille les 7, 8 et 9 septembre
    • CyberRes Spotlight Series: "Women in Cyber" - Valérie Mayer
    • CyberRes Track Keynote at Micro Focus Universe | March 22, 2022
    • Cybersecurity attack hits world's largest meat supplier JBS' IT systems in the US and Australia
    • Cybersecurity Awareness Month: Is it time to review your approach?
    • Cybersecurity Being Ignored? 98% Indian Establishments Report Shortage In Security Operations Staff
    • Cybersecurity conference, Washington, Oct. 2018 - ArcSight presentations
    • Cybersecurity conference, Washington, Oct. 2018 - ArcSight presentations, PART 2
    • Cybersecurity conference, Washington, Oct. 2018 - Fortify presentations
    • Cybersecurity conference, Washington, Oct. 2018 - IAM presentations
    • Cybersecurity conference, Washington, Oct. 2018 - solutions' presentations
    • Cybersecurity conference, Washington, Oct. 2018 - solutions' presentations, part 2
    • Cybersecurity conference, Washington, Oct. 2018 - solutions' presentations, part 3
    • Cybersecurity conference, Washington, Oct. 2018 - Voltage presentations
    • Cybersecurity conference, Washington, Oct. 2018 - ZENworks presentations
    • Cybersecurity Data Science: Detecting Unusual Behaviors with Math
    • Cybersecurity Experts Weigh In On Data Privacy Day | Information Security Buzz
    • Cybersecurity Leaders: Planning (and Budgeting) for 2021
    • Cybersecurity Podcast Episode 72: Ramses Gallego
    • Cybersecurity policy is a must in government
    • Cybersecurity Strategies for Securing Digital Transformation
    • Cybersecurity too often takes back seat in C-suite
    • Cybersecurity, Vulnerabilities Not Priorities for Most Hospitals
    • Cybersécurité : sans personne au bureau, il faut réadapter les accès des collaborateurs Informatique
    • Dark data, una miniera di valore inutilizzata » inno3
    • Data breach cost rises to $4 million per incident
    • Data breach exposes diagnosis data of 34,000 medical marijuana patients | ZDNet
    • Data breach exposes millions of DHS emails, patient records
    • Data breach fallout haunts companies long after the fact
    • Data breach may have exposed the personal, medical information of 600,000 in Michigan
    • Data Breaches have a severe financial impact
    • Data breaches increased 54% in 2019 so far
    • Data Connectors Los Angeles: Outcomes Based Approach through Cyber Security Leadership, 11/4
    • Data Connectors Toronto Cybersecurity Conference 2019, March 21
    • Data from half a billion LinkedIn users has been scraped and put online
    • Data masking – What your business needs to know
    • Data of three million elderly citizens exposed in cloud security oversight
    • Data privacy can mean jail time for CEOs
    • Data privacy challenges will increase in 2020 with actual enforcement
    • Data Privacy Day: Gaining and maintaining trust is key for data defenders
    • Data Privacy Day: Get up speed fast on GDPR, CCPA and Privacy with TechBeacon's Guide
    • DATA PRIVACY DAY: SECURITY INDUSTRY HIGHLIGHTS KEY ISSUES
    • Data Privacy Financial Risk Calculator
    • Data Privacy vs Digitale Transformatie: verenigbare elementen?/Optimale databeveiliging (in Dutch)
    • Data Privacy with ZENworks - YouTube
    • Data privacy – from understanding to believing to enforcing
    • Data Privacy, Retail And Consumer Goods: Meeting the needs of CCPA
    • Data privacy, security and governance in 2020: Top 5 trends | CybersecAsia
    • Data Privacy: from necessary security step to competitive advantage
    • Data security: Are you in pray, hope or believe mode? | DigiconAsia
    • De juiste securitystrategie? ‘Apps en data allebei topprioriteit’ (article in Dutch)
    • De security uitdagingen en van een grote Amerikaanse zorg dienstverlener | Whitepapers
    • Demystifying Data Analytics and Protection
    • DevOps et sécurité sont devenus indissociables
    • devops REX 2019 - REX DevSecOps, le constat de 130 Responsables Informatiques replay
    • Devs are the key to app sec: Make training a priority
    • DevSecCon Seattle, Sept. 16-17
    • DevSecOps : où en sont les entreprises françaises ?
    • DevSecOps Day: Wie BMW und die Deutsche Börse ihren SDLC absichern - 11.2.2021 (in German)
    • DevSecOps Leadership Forum in Toronto Canada, May 8
    • DevSecOps Leadership Forum Online, May 7
    • DevSecOps Survey 2019: Wie sicher sind Ihre DevOps-Prozesse?
    • DevSecOps survey is a reality check for software teams: 5 key takeaways
    • DevSecOps Survey: You need happy developers to build secure software
    • DevSecOps – the perfect marriage between DevOps and Security
    • Die Gegenwart und Zukunft der Datensicherheit
    • Die IT-Security-Trends 2021, Micro Focus Deutschland GmbH (article in German)
    • Die Sache mit der Sicherheit – von DevOps zu DevSecOps (in German)
    • Digital Badges Update
    • Digital Badges Update: certifications to prove your skills and expertise
    • Discover how SMAX delivers ESM at SITS 2019, London, 1 - 2 May
    • Discussions on Cyber Resiliency with Speakers from IDC - Webinar Series
    • dmradio's podcast: From GDPR to CCPA: A New Regulatory Reality
    • Do cybersecurity like a boss: 35 experts to follow on Twitter
    • Docker Security: Avoiding the ROOT of all Evil
    • DoD to Require Cybersecurity Certification From Defense Contractors
    • DOD Warns of Cyber Risks as Employees Work From Home
    • DoD’s AI 2021 Symposium and Tech Exchange, June 22-24
    • DOE Cybersecuirty and Technology Conference | June 13-16, 2022 | Portland, OR
    • DOE Speaking Sessions with Kate Scarcella | DOE Cybersecurity and Technology Conference | June 15th
    • Don’t be a Breach Statistic - Attend the Micro Focus Cybersecurity Summit June 11-13
    • Don’t Just Recover From The Pandemic—Emerge Stronger With These 4 Technologies
    • Don’t miss this IAM Webinar: Best Practices for Taking Control of Privilege in your Organization
    • Dragos and Micro Focus Team for Improved Visibility of OT Threats
    • Drei Voraussetzungen für sichere, gut funktionierende Remote-Work-Umgebungen (in German)
    • Dupe' there it is: SAML authentication bypass threatens Microsoft
    • DX Radio Episode 1: DX Best Practices for Data Management, Protection, and Privacy
    • DXC and Micro Focus presenting at ISMG Cybersecurity Summit NY
    • DZone Research: The Most Important Security Elements
    • Développeurs et RSSI unis contre les cybercriminels
    • ebook: The Rise of Cloud-Based Security Analytics and Operations Technologies
    • Effective end-to-end security framework
    • Eight cities' payment records impacted in Click2Gov portal breach
    • Eight US Cities See Payment Card Data Stolen
    • El coronavirus també és un virus informàtic (in Spanish)
    • El Foro Económico Mundial teme las amenazas cibernéticas y la fragmentación digital
    • EMEA Exhibition Zone Sponsors
    • Employee cybersecurity essentials part 2: Lost devices and unsafe connections
    • Encuentro IT Trends: Entendiendo la Era del dato: tecnologías y propuestas para gestionar la "datificación", 29 de junio (in Spanish)
    • Endace and MF Partnership Delivers New Security Insights for Threat Hunting and Investigation
    • Enhancing cyber resilience: What your team needs to know
    • Enterprise data breach cost reached record high during COVID-19 pandemic
    • Enterprise Resiliency
    • Enterprise Risk Management: A New Beginning - InformationWeek
    • Enterprise Scale DAST - “Fortify WebInspect is All Grown Up”
    • Equifax to Pay up to $700 Million to Consumers, Authorities Over 2017 Breach
    • EU merges giant biometrics database. What could possibly go wrong?
    • European Commission unveils new cyber-resilience rules
    • European court strikes down EU-US Privacy Shield user data exchange agreement as invalid
    • Europäischer Datenschutztag 2020 - Die Gegenwart und Zukunft der Datensicherheit
    • Evaluating threats against and vulnerabilities of critical assets
    • Evanta CISO Summit Detroit Boardroom Session, June 5: Solving the Identity Crisis
    • Evanta CISO Summit Toronto Boardroom Session, May 13
    • Evanta CISO Summits: West USA. Join the Micro Focus Security, Risk and Governance team
    • Event Detail - Quello che ancora non sapevi di Micro Focus Cyber Security - Roma 11.04
    • Event: FutureCon Virtual Eastern Cybersecurity Conference, June 30th - July 2nd
    • Expert 2021 Cybersecurity Predictions (Insight Jam Roundup)
    • Explore Cybersecurity Careers at Micro Focus
    • FaceTime FauxPas: Sorry-not-sorry about the bug bounty boo-boo
    • Fachartikel bei IT-Daily.net: Clean Data – Der Weg zu optimaler Datenqualität für effektiven Datenschutz (article in German)
    • Fachartikel im IT-Finanzmagazin: 5 Aspekte für den optimalen ROI bei DevSecOps (article in German)
    • Failing Toward Zero: Why Your Security Needs to Fail to Get Better
    • FatFace sends controversial data breach email after ransomware attack
    • FBI: Cybercrime skyrocketed in 2020, with email compromise scams accounting for 43% of losses
    • FCW Cloud Summit 2021, April 28
    • Federal cyber agency announces new campaign to fight ransomware attacks
    • Federal government rolls out new framework for security clearance process -- FCW
    • Feds warn: Managed service providers being hacked—so stop your complacency
    • Feds will weigh whether cyber best practices were followed when assessing HIPAA fines
    • File Analysis Suite to Reduce Risk Associated with Global Data Privacy Regulations Released!
    • FIMA Europe 2022 | etc. venues St. Paul's, London | November 16-17
    • Financial services security by the numbers
    • Finding Trust and Transparency in AI During Doubtful Times
    • Fireside chat: “Securing The Software Supply Chain” on April 6
    • Five Key Provisions a Federal Privacy Law Should Include
    • Five Steps to Defend Your Company Against a Security Breach
    • Five Tips to Enable Secure Access for Your Remote Workforce
    • Fixing Spring4Shell vulnerability | Debricked
    • Flipboard Says Hackers Hid In Its Systems For Nine Months
    • Follow tried, tested cyber security frameworks
    • Foro Tendencias Tecnológicas 2021: LA SEGURIDAD Y LA SOBERANÍA DEL DATO; 6 de julio
    • Forrester recognizes Fortify as a leader in static application security testing
    • Fortify Customer Success Stories: All in one place!
    • Fortify Expert Day - All the Fortify Experts - Online for You, June 16
    • Fortify is the proud Gold sponsor of the LoneStar AppSec Conference, happening Oct 28-29
    • Fortify on Demand (FoD) Static Scan Workflow (2019)
    • Fortify on Demand for AWS GovCloud to Increase Security for Critical Federal Agency Applications
    • Fortify on Demand Releases version 19.1
    • Fortify Provides Security, Vulnerability Detection for Defense Department with Platform One Iron Bank Certification
    • Fortify SSC to JIRA Bug Tracking Integration (2019) - YouTube video
    • Fortify User Group June 30, 2022 3:30 SGT/HKT | 1:00pm IST
    • Fortify User Group Meeting - final session in ScanCentral DAST Series
    • Fortify User Group Sessions in USA, September 2019
    • Fortify Users Give Back…Share a Review with Gartner Peer Insights
    • Fortify Webinar Series
    • Forum International de la Cybersécurité | Lille Grand Palais, 28-30 Janvier
    • Four Steps to Take Your API Security to the Next Level
    • FranSec Virtual Summit, 24&25 juin
    • Free 3-month Micro Focus ART license to help you generate structured on-boarding content
    • Free Report--The Pulse: Emerging Technology 2021
    • Free Report: Achieve Zero Trust with TIC 3.0
    • Fresh Privacy Legislation Would Jail CEOs for Violations
    • From the Field - Stories of Successfully Detecting Cyber Attacks | SecTor 2022 | Oct. 6 | 2:45 PM | Theater 2
    • Future of Fed IT Relies on Workforce, Kent Says – MeriTalk
    • FutureCon Atlanta Cybersecurity Conference, Jan 15
    • FutureCon Atlanta Speaking Session, Atlanta, Jan 15
    • FutureCon Chicago Speaking Session
    • FutureCon Chicago, March 27
    • FutureCon Cybersecurity Conference - Minneapolis | March 10 | In Person or Virtual
    • FutureCon CyberSecurity Conference | San Diego | November 16
    • FutureCon Cybersecurity Conference – Dallas, Aug. 11
    • FutureCon Houston, May 15
    • FutureCon LA Speaking Session, "Evading Death by Silver Bullet", Feb 27
    • FutureCon Online Session: Becoming a Cyber Resilient Enterprise, Feb 24
    • FutureCon St Louis Speaking Session: “Evading Death by Silver Bullet,” March 13
    • FutureCon St. Louis, March 13
    • FutureCon Virtual Central Cybersecurity Conference, Free Registration! - Aug. 4
    • FutureCon Virtual Detroit CyberSecurity Conference, Jan 20
    • Futurecon Washington D.C. Speaking Session, April 24
    • Futurecon Washington D.C., April 24
    • Gartner 2019 Magic Quadrant for Application Security Testing
    • Gartner 2019 Market Guide for Data Masking
    • Gartner 2020 Magic Quadrant for Application Security Testing - Micro Focus Named a Leader
    • Gartner Forecasts IT Spending in India to Total US$94 Billion in 2020, Up 6.6% From 2019
    • Gartner IAM London Speaking Session “Evading Death by Silver Bullet", March 7
    • Gartner Identifies Top Security and Risk Management Trends for 2022
    • Gartner Identity and Access Management (IAM) Summit 2019 in Las Vegas, NV
    • Gartner Identity and Access Management (IAM) Summit 2019 in London, UK, March 7 - 8
    • Gartner names Micro Focus as Magic Quadrant security leader
    • Gartner Peer Insights for ZENworks Config Management - Excellent Product and Large Feature List
    • Gartner Peer Insights Review for Micro Focus Asset Manager or ZENworks Asset
    • Gartner Peer Insights Review for Micro Focus Fortify
    • Gartner Peer Insights Review for Micro Focus Fortify - tell the world
    • Gartner Predicts for the Future of Privacy 2019
    • Gartner Says Just Four in 10 Privacy Executives Are Confident About Adapting to New Regulations
    • Gartner Security & Risk Management Summit 2019 | National Harbor, MD, June 17-20
    • Gartner Security and Risk Management Summit Speaking Session, June 18
    • Gartner Speaking Session: Zero Trust Security….The Evolution of Trusted Identities
    • Gartner: How to Get the Most From Your Application Security Testing Budget
    • GDPR Is Tough and Set to Get Even Tougher
    • GDPR One Year Later - Cybersecurity Industry Comments | Information Security Buzz
    • GDPR Third Anniversary: Industry Experts Chime In
    • German firms BASF, Siemens, Henkel hit by cyber attacks
    • Get Highlights of the 2018 Micro Focus Cybersecurity Summit and plan to attend in 2019
    • Get on the Road to Autonomous IAM
    • Get on the Road to Autonomous Identity and Access Management
    • Get security and compliance with DevSecOps: 4 key components
    • Getting Ready for CCPA
    • Give Input on Your Digital Transformation and take this survey!
    • Global AppSec 2020 Virtual
    • Go beyond policy: 5 keys to data protection compliance
    • Google admits to storing plaintext passwords
    • Google, Apple, Mozilla enforce 1-year max certificate expiration
    • Google: 'Spectre can't be fixed.' Panic now?
    • Government Briefing at The Westin Ottawa Hotel, Canada, Oct 9
    • Guaranteed-to-run Training Schedule
    • Guess Confirms Ransomware Attack and Data Breach
    • Guide to Protecting Source Code: How Machine Learning can improve visibility into use and misuse
    • Hacker allegedly tried to poison San Francisco Bay Area water supply
    • Hacker Halted: Virtual Cybersecurity Conference October 19TH-23RD, 2020
    • Hacker selling off Facebook users' phone numbers following data breach
    • Hackers are preying on fears of Covid-19, say cyber security experts
    • Hackers are preying on fears of Covid-19, say cyber security experts (2774570)
    • Hackers breach Electronic Arts, stealing game source code and tools
    • Hackers have only just wet their whistle. Expect more ransomware and data breaches in 2021.
    • Hackers love Docker: Container catastrophe in 3, 2, 1...
    • Hackers target Kubernetes to steal data and processing power. Now the NSA has tips to protect yourself
    • Hackers Targeting professionals With 'more_eggs' Malware via LinkedIn Job Offers
    • Hacking regrets: The Colonial Pipeline and lessons to be learned
    • Half a billion Facebook users' information posted on hacking website, cyber experts say
    • Happy birthday, GDPR. You're awful; you're great
    • Happy Holidays from the CyberRes Team!
    • Hard Pass: Declining APT34’s Invite to Join Their Professional Network
    • Hard Pass: Declining APT34’s Invite to Join Their Professional Network (2688435)
    • Has Your Password Been Stolen? Here’s How To Find Out
    • Have You Joined the CyberRes Global User Group Yet?
    • Health Data Breach Not Reported for Seven Months
    • Health Data Breach Trends: A Mid-Year Assessment
    • Health Insurer Fined $5.1m Over Data Breach
    • Health-ISAC Spring Summit , FL-Naples, May 18-20
    • Here are what CISO's named as their 20 critical priorities for 2022
    • Here's a better way to do compliance and risk management
    • Here’s why the healthcare industry is every hacker’s favorite vertical
    • HIMSS Global Health Conference & Exhibition, Aug. 9 - 13, Las Vegas
    • HIMSS Healthcare Conference Video
    • Home Chef confirms 8 million user records stolen in breach
    • Home Office Admits 100 GDPR Breaches in EU Scheme
    • How a hacker attempted to poison a city's water supply and the cybersecurity lessons learned
    • How adaptive trust makes security efficient
    • How AI can be a COVID-19 game-changer
    • How AI cybersecurity thwarts attacks -- and how hackers fight back
    • How Cloud Can Drive Sustainable, Data-Driven Success
    • How Covid-19 has worsened corporate cybersecurity woes
    • How cybersecurity leaders are overcoming the new risk landscape
    • How dark data puts your business in jeopardy
    • How do I select an application security testing solution for my business?
    • How Google and Facebook do code analysis
    • How governments can build effective and secure services
    • How Increasing Coronavirus And Post-Election Conflict May Affect Automotive Cybersecurity
    • How Indian CIOs are tackling Coronavirus - ET CIO
    • How Leaders Can Align Their Tech Team With Their Business Strategy
    • How machine learning bolsters your security operations
    • How MIT's SCRAM could break the cyber-attack logjam
    • How one official wants to increase DHS cyber efficiency
    • How Organizations Can Build Cyber Resilience Against a New Wave of Cyber Threats
    • How ready are you to combat cybercriminals?
    • How reference architectures create new possibilities for DevSecOps
    • How researchers can cash in on CI—and deliver better security
    • How Small Mistakes Lead to Major Data Breaches
    • How strong are your secure coding skills? Test them live at virtual Universe! May 22nd
    • How to Balance Usability and Data Protection in the BYOD Era
    • How to boost internal cyber security training
    • How to boost your enterprise's immunity with cyber resilience
    • How to build infrastructure security assurance with InSpec
    • How to build the software team culture you'd want to work in
    • How to check if you’re part of the Facebook data breach
    • How to comply with the California privacy act
    • How to create a digital workplace
    • How to develop a road map to resilience with DevSecOps
    • How to do application security on a budget
    • How to fight cybercrime in 2019: Risk leaders must unify their approach
    • How to Keep Employee Home Wireless Networks from Being Weakest Link your Cybersecurity Chain
    • How to learn from past attacks—and boost your cyber resilience
    • How to lock down your serverless apps in five steps
    • How to Make Cybersecurity a Top Priority for Boards and CFOs
    • How to marry security and IT operations
    • How to prevent API abuse with your mobile apps
    • How to prioritize open-source risk with susceptibility analysis
    • How to put crowd-hacking to work for your organization
    • How to secure your data as you go digital
    • How to Security Test Your APIs
    • How to test encrypted apps the right way
    • How to track the attacks that matter to your organization
    • How ZENworks2020 can help protect against threats
    • Humans & Machines Podcast: Colonial Pipeline Cybersecurity Attack
    • Humans and Machines Episode Blog: GDPR and You, featuring Carole Piovesan
    • Humans and Machines Podcast Blog: Blockchain and Security
    • Humans and Machines Podcast Show Notes
    • Hybrid IT creates competitive advantages
    • Hybrid Work Models Could Benefit Organisations—But Only if Cybersecurity Is In Check
    • ICIT 2020 Winter Briefing, The Next Decade of Security & Modernization, Washington, DC, Feb 4
    • ICIT Winter Briefing - Washington, D.C., February 4, 2020
    • IDC Analyst Connection: Key Strategies for Managing New Risks in Cybersecurity
    • IDC InfoBrief: Exclusive insights from over 1000 enterprise leaders across Asia Pacific
    • IDC Names Micro Focus a "Major Player" in its 2019-2020 EMM Software Marketscape!
    • IDC Research: Are We Cyber-Resilient? The Key Question Every Organization Must Answer
    • IDC Security Roadshow 2021, April 21/22 (in Portuguese)
    • IDC – Micro Focus exclusive conference: Technology Horoscope 2021 | December 11
    • Identifying critical assets, data, and intellectual property
    • Identity management with SIEM: A better breach defense
    • If you are compliant, does it mean you are secure?
    • If You Have to Ask How Much a Data Breach Costs, You Can't Afford One
    • IMA announces 2020 conference
    • Implementing Data Security Throughout the Enterprise
    • Improving and Monitoring a Data Security Practice
    • Improving the Nation’s Cybersecurity: An ICIT Fellows’ Analysis of President Biden’s Executive Order
    • In the fairy tale from Cyberland, will the Big Bad Hacker Wolf get the 3 little piggys data?
    • In-built security a must for govtech applications: Micro Focus CTO - ET Government
    • Increase Cyber Resilience with Zero Trust
    • India faces high impact of hacking in APAC region: Report - Express Computer
    • India faces talent crunch for cyber threat detection even as it leads in cloud adoption
    • India Micro Focus Round Table Discussion - Securing Data Access, Privacy and Governance | 18 June 2021
    • InfoGraphic: Securing cloud-resident sensitive data
    • Innovate Cybersecurity Conference, Scottsdale, Arizona, Oct 3-6
    • Insider Threats: Mitigating the Risks at Your Agency
    • Insurer Races to Fix Security Flaws After Whistleblower Alert
    • Integrate Identity Governance and Administration with Workday
    • International Cyber Expo 2022 | September 27-28 | Olympia London
    • Interset Launch Canada, Toronto, May 14
    • Into Security Podcast - Episode 23: Diversity in Cybersecurity
    • Introducing the Fortify User Group Roadshow – A Recipe for AppSec Success
    • Introduction to the TestGuild Security Testing Podcast
    • Intégrer la sécurité avec le DevSecOps
    • Intégrer la sécurité dans les pratiques DevOps (Infographie)
    • Intégrer la sécurité dans les pratiques DevOps (Infographie) (2697754)
    • Inversiones en ciberseguridad: ¿cuánto es suficiente?
    • Invitation to Micro Focus Realize 2020 MEA, Oct. 12
    • Is Healthcare Sector Better Prepared for Ransomware Attacks?
    • Is your enterprise susceptible? 4 key focus areas for cyber resilience
    • Ist Ihr Unternehmen cyber-resilient? Den Hackern einen Schritt voraus (Webinar in German)
    • Istanbul Grand Airport's Digital Transformation with Micro Focus
    • IT security: 4 tips against internal risks
    • It's Official: CCPA Enforcement Begins
    • It's time for IT Ops and security tools to finally converge
    • IT-Sicherheit: 4 Tipps gegen interne Risiken
    • It’s not about a world of insecurity but a world with IN Security
    • Jaguar Racing Formula E Team Welcomes Official Partner Micro Focus
    • Jaguar Racing partners with MF to enhance digital security, business resiliency and cyber posture
    • Jaguar TCS Racing Virtual Garage Tour—Live from NYC! | July 13 2022
    • Jamaica’s immigration website exposed thousands of travelers’ data
    • January Security Engage customer newsletter
    • Jisc cyber security posture survey results: A snapshot of the cyber security landscape in education
    • Jobs in Information Security (InfoSec)
    • Join DXC Technology and Micro Focus at the ISMG Cybersecurity Summit NYC
    • Join Micro Focus at INTERFACE Cloud: Portland 2019, March 26
    • Join Micro Focus at Optiv’s RSAC After Party! San Francisco, Feb 25 -27
    • Join Micro Focus Security at the RSA Conference, March 4 - 8
    • Join Micro Focus’ Global AppSec Strategist Martin Knobloch at the upcoming OWASP meetup session, June 24
    • Join Rishi Rajpal, VP of Global Security at Concentrix, March 24
    • Join Security, Risk & Governance Fireside chat: Business Continuity Dialogue 2020 | 15-16 July
    • Join the Micro Focus Technical Insight Series and discover how to maximize your IT investments!
    • Join us at Interset Lunch & Learn, Montréal, Québec, May 23: Machine Learning in Cybersecurity
    • Join us at Micro Focus Universe for InfoSec keynotes and customer-led sessions
    • Join Us: European Identity & Cloud Conference 2022 | May 10 - 13
    • Journey to Multi Cloud - CSA Bangalore Chapter, Sept 25
    • Karamba Security Announces XGuard Monitor to Manage the Security of Millions of IoT Devices at Scale
    • Keeping customer data safe and private in the new decade
    • Keeping up with Compliance Requirements from a Security Perspective
    • Keeping your organisation secure now more critical than ever - TechCentral
    • Key Biscayne Third Florida City To Report Data Breach
    • Key Takeaways from Implementing a Data Security Practice
    • Know What To Expect From The California Consumer Privacy Act Infographic
    • Konferencja Micro Focus Realize 2021, 26 January (event in Polish)
    • Kostenfrei anmelden: DevSecOps Day 2021 am 11. Februar (in German)
    • Kostenfreie Webinar-Serie: Cloud Security in 6 Schritten
    • Kostenfreies Security-Webinar: Liegt die Zukunft in der Cloud?, 24. April
    • Kostenfreies Webinar: Wie schützen Sie Ihre Daten in der Cloud? 20. April
    • Kubernetes security audits: What admins need to know—and do
    • Kuppingercole Takes notice of NetIQ Access Manager
    • La cyber-résilience au service de la résilience de l'entreprise en temps de crise (in French)
    • Lack of alignment between business goals and quality ambitions impedes Agile and DevOps adoption
    • Lack of Secure Coding Called a National Security Threat
    • Lack of Secure Coding Called a National Security Threat (1792615)
    • Latest US Healthcare Ransomware Attacks Have Harsh Impact
    • Le aziende nella nuova normalità chiedono cyber resilience (article in Italian)
    • Leaders Agree that Cybersecurity is About People
    • Leading a digital trust movement - Raconteur
    • LegalTech Emerging Tech Session - Information Governance, Analytics & Privacy, Feb 4
    • Legalweek(year) 2021 Micro Focus Consultancy, March 16, April 13 and more dates
    • Les Assises: Rendez-vous des experts de la cybersécurité, du 14 au 17 Octobre 2020 à Monaco
    • Les essentiels de la cybersécurité en entreprise – Les Echos
    • Les RIAMS 2019, 22-24 mai, Les Rencontres de l'Identité, de l'Audit et du Management de la Sécurité
    • Lessons from the Kubernetes flaw: Shift your security upstream
    • Let UX guide your security requirements! - Express Computer
    • Lifelabs Data Breach, the Largest Ever in Canada, May Cost the Company Over $1 Billion
    • Listen to "How Doctors On Demand Exceeded Cyber Security Industry Standards" session, July 22
    • Live Webinar | Security and Privacy: Two Sides of the Same Coin?, Oct 2nd
    • Live-Webinar 23. Juni: 360°-Echtzeit-Compliance im Netzwerk (in German)
    • Livre Blanc - Adoption des pratiques DevSecOps : où en sont les entreprises françaises ?
    • Lockdown anniversary - how has the cybersecurity landscape evolved?
    • Lookbook: Proactive Threat Hunting
    • Los ataques de phishing aumentaron en un 250% en 2018
    • Los ataques de suplantación de identidad de phishing aumentaron 67% en los últimos 12 meses
    • Machine learning in cybersecurity: One size doesn't fit all
    • Machine Learning in the SOC—Part 1: Speed Up Your SecOps
    • Machine Learning in the SOC—Part 2: Identify Your Use Cases
    • Machine Learning in the SOC—Part 3: Best Practices for Success
    • Machine Learning: You ain't seen nothing yet
    • Make your product compliant with privacy laws: A new framework
    • Make your security spend last by investing in cyber resilience
    • Making India Aarogya in Cybersecurity
    • Manage, Secure and Protect your Endpoints with ZENworks 2020
    • MAS guidelines post-SolarWind breach to impact finance sector's bid to transform
    • Massive biometric data breach found in system used by banks and Met police
    • McDonald's in South Korea, Taiwan hit by data breach
    • MDM in the remote era: 4 trends that matter to your security
    • Medical records for 24.3 million left exposed | SC Media
    • Meet Micro Focus Security teams at Evanta CISO Summits: USA East
    • Meet the Micro Focus Premium Solution Support Engineer (SSE)
    • Meet the Top 20 Indian Women Influencers in Security 2020
    • Menos de un tercio de los desarrolladores asumen toda la responsabilidad de la seguridad
    • Mercedes Benz Data Leak Includes Card and Social Security Details
    • Mesa de Discusión -¿Desarrollo rápido, seguro o de valor? Martes 21 de septiembre (in Spanish)
    • Messenger apps: A security nightmare to haunt SecOps
    • Micro Focus / Accenture Executive Innovation Briefing- NY, Dec 6
    • Micro Focus 2021 Predictions: Applied Learning from Historical Unpredictability
    • Micro Focus adquiere Interset, especialista en análisis de seguridad
    • Micro Focus adquiere Interset, especialista en análisis de seguridad (1764065)
    • Micro Focus and Vidsys at the Global Security Exchange 2019, Sept. 10-12
    • Micro Focus announces preliminary financial performance results
    • Micro Focus AppSec Hackathon, June 18
    • Micro Focus Asset Manager and ZENworks Asset Management Named Gold Medalists and Market Leaders
    • Micro Focus at DXC Technology Analyst & Advisor Forum, Nov 4-5
    • Micro Focus at Microsoft Ignite: Accelerate Your Move to the Cloud, Nov 4-8
    • Micro Focus Buys Cybersecurity Startup Interset For Analytics Expertise
    • Micro Focus Chief Technologist shares his view on how Micro Focus can help with Cybersecurity
    • Micro Focus Completes Acquisition of Interset to Further Expand Cyber-Security Expertise
    • Micro Focus Consulting. Professional. Service. How does Micro Focus Consulting perform against the competition?
    • Micro Focus Cybersecurity 2019 | Threat Analysis Symposium in the Age of Ransomware
    • Micro Focus Cybersecurity Summit - June 11-13
    • Micro Focus Cybersecurity Summit content and hotel discount—register now!
    • Micro Focus CyberSecurity Summit General Session
    • Micro Focus Data Access Governance to be highlighted at 2019 conferences
    • Micro Focus Deepens Channel Commitment in Asia Pacific and Japan
    • Micro Focus DevOps User Forum 28 July 2021
    • Micro Focus DevSecOps - Scale for Digital Innovation
    • Micro Focus Dinner and Learn, Denver, CO, Aug 15
    • Micro Focus Experience Tour 2019, Buitenplaats Kamerijck, Kamerik, June 13
    • Micro Focus Experience Tour 2019, Stockholm, May 15  
    • Micro Focus Experience Tour EMEA 2019 – Agenda; Thursday 13 June, Buitenplaats Kamerijck, Kamerik
    • Micro Focus expert on how CIOs can lead by example to embrace the ‘new normal’
    • Micro Focus expert on staying one step ahead in the world of Internet security | | Intelligent CISO
    • Micro Focus experts on building overall resiliency to face any future crisis
    • Micro Focus Fortify Expert Days, Dec 8 & 9: Meet Our Experts
    • Micro Focus Fortify User Group: Learn from and network with local Fortify users, March 10
    • Micro Focus Fortify Virtual User Group: Learn from and network with Fortify users
    • Micro Focus Fortify wins Application Performance Management Gold Medal at the RSA Conference
    • Micro Focus hace posible una transformación digital segura (article in Spanish)
    • Micro Focus Honored With 5-Star Rating in the 2021 CRN Partner Program Guide
    • Micro Focus implements security solution for Kuwait Finance House
    • Micro Focus Introduces Active Directory Bridging to Extend Security Policies and Access Controls
    • Micro Focus Introduces Voltage SmartCipher, Delivering Transparent Unstructured Data
    • Micro Focus is a Cybersecurity Awareness Month Champion
    • Micro Focus is a Cybersecurity Awareness Month Champion (2828737)
    • Micro Focus is a Data Privacy Day Champion, Jan. 28
    • Micro Focus is a National Cybersecurity Awareness Month Champion
    • Micro Focus Launches File Analysis Suite to Reduce Risk from Global Data Privacy Regulations
    • Micro Focus Named To CRN’s 2021 Security 100 List
    • Micro Focus NetIQ Expert Days, June 29 (Europe) or June 30 (North America)
    • Micro Focus NHS Customer Forum, London, May 9
    • Micro Focus Officially Acquires Interset for Cybersecurity Expertise
    • Micro Focus Opens New Data Hosting Center in Germany
    • Micro Focus Platinum Partners Driving Security Sessions at Cybersecurity Summit
    • Micro Focus Positioned as a Leader in Gartner 2019 Magic Quadrant for Application Security Testing
    • Micro Focus Premium Named Support Engineer – Fast Incident Resolution
    • Micro Focus Premium Support Introductory Video and eBook for Download!
    • Micro Focus Premium Technical Account Manager - Proactive Problem Prevention
    • Micro Focus Presents CISO Resource to Accelerate Enterprise Resilience
    • Micro Focus Published 2020 State of Security Operations Report
    • Micro Focus rachète Interset et complète son offre cybersécurité - Le Monde Informatique
    • Micro Focus Realize 2019 - Australia
    • Micro Focus Realize 2019 - March, Kuala Lumpur, Singapore, Jakarta, Manila
    • Micro Focus Realize 2020 MEA - Security, Risk & Governance Track, 12 October
    • Micro Focus Realize 2020 NL & Belgium: Users and behavior: your biggest security risk? Nov. 17
    • Micro Focus Realize 2021 : du DevOps à la Cyberrésilience , 21 janvier (French event)
    • Micro Focus REALIZE is headed to Australia: Melbourne, Sydney, Canberra
    • Micro Focus Realize Tour 2020 - Italia, 26-29 Ottobre (in Italian)
    • Micro Focus Recognized as a 2021 Gartner Peer Insights™︎ Customers' Choice in SIEM for CyberRes ArcSight
    • Micro Focus Security Engage Newsletter - April 2020
    • Micro Focus Security Engage Newsletter - July 2020
    • Micro Focus Security Insights Newsletter - February 2020
    • Micro Focus Security Operations Day 2019 on June 6, 2019 in Böblingen (Germany)
    • Micro Focus Security Operations Innovation – Mark Your Calendar to Learn More! May 15 Webinar 
    • Micro Focus Security wins the Securonix Partner Excellence Award at the RSA Conference
    • Micro Focus Security, Risk, and Governance Keynote
    • Micro Focus sera présent aux Assises de la Sécurité du 9 au 12 octobre à Monaco !
    • Micro Focus Summit 2019, London, June 20  
    • Micro Focus Tackles Thorny Unstructured Data Protection Issues
    • Micro Focus Technology Horoscope 2021 | 11 December 2020
    • Micro Focus TTP USA 2021 Conference Online, July 12 to 16
    • Micro Focus Universe 2020 Europe - Security, Risk and Governance Track, 17-19 March
    • Micro Focus Universe 2020 North America | Security, Risk and Governance Track
    • Micro Focus Universe 2020 | Europe
    • Micro Focus Universe 2021 APJ - Join Rishi Rajpal, VP of Global Security at Concentrix
    • Micro Focus Universe 2021—High Tech, Low Drama at High Speeds
    • Micro Focus Universe 2022 On Demand Now Available
    • Micro Focus Universe Cyber Resilience track keynote with John Delk
    • Micro Focus Universe Europe Security, Risk & Governance track keynote with John Delk, March 17
    • Micro Focus Universe On demand
    • Micro Focus Universe on Demand - Security, Risk & Governance sessions  
    • Micro Focus Universe on Demand - Security, Risk & Governance sessions   (1767697)
    • Micro Focus Universe Security, Risk & Governance Keynote On-demand
    • Micro Focus Unveils Policy Compliance Assessor to Accelerate Cloud Migration
    • Micro Focus Virtual Realize 2020 Australia and New Zealand - Security, Risk and Governance track
    • Micro Focus Virtual Universe 2020 - On-demand Sessions
    • Micro Focus Virtual Universe 2020 - On-demand Sessions (2805190)
    • Micro Focus Virtual Universe 2020 - SRG On-demand Sessions
    • Micro Focus Virtual Universe 2020 | On-Demand now available!
    • Micro Focus Virtual Universe—One Intern’s Virtual Journey
    • Micro Focus virtualUniverse Security, Risk & Governance track keynote with John Delk
    • Micro Focus virtualUniverse Security, Risk & Governance track keynote with John Delk!
    • Micro Focus Wins "Security Transformational Leader of the Year" Award
    • Micro Focus übernimmt SOAR-Entwickler ATAR Labs (in German)
    • Micro Focus ขอเชิญร่วมงานสัมมนาออนไลน์ DevSecOps: 2020 Reflections and Accelerating Growth (Thai)
    • Micro Focus 远程办公加速大礼包
    • Micro Focus' CyberRes to Pursue FedRAMP Authorization on Multiple Cyber Resilience Solutions
    • Micro Focus, Snowflake to Provide Secure Analytics
    • Micro Focus, Together with India’s iValue InfoSolutions, Commits to Deliver Modern Cybersecurity
    • Micro Focus: Die IT-Security-Trends 2021 (article in German)
    • Micro Focus: Named a Leader in 2019 Gartner MQ for Application Security Testing
    • Micro Focus’ CyberRes data security offerings gain recognition for supporting Zero Trust approach
    • Micro Focus’ Rob Roy: Machine Learning, Cloud Tech Could Aid in Gov’t Cybersecurity - GovCon Wire
    • MicroFocusUniverse: Cyber Resilience Assessment
    • Microsoft Exposed 250 Million Customer Support Records - Security Week
    • Microsoft Warns Hackers Using Call Centers to Trick Users Into Downloading Ransomware
    • Mimecast: SolarWinds Attackers Stole Source Code
    • Minimizing Digital Threats through Cyber Resilience | SC Magazine E-summit | July 19-20
    • Mitigating mainframe cyber blind spots through IT modernization | Federal News Network
    • Mixcloud Breach Affects 21 Million Accounts
    • Mobile-Only Bank Monzo Warns 480,000 Customers to Reset PINs
    • Modernizing breach defense for the manufacturing and automotive industries
    • More Community Changes Are Underway   - read only mode for 24h!
    • More than 38,000 people will stand in line this week to get a new password | ZDNet
    • More US Cities Battered by Ransomware
    • Most companies suffered a cloud data breach in the past 18 months
    • Movement to Develop Cybersecurity Standards for Critical infrastructure
    • Moving Passwordless Beyond a Short-Term Itch (Part 1)
    • Multiple Yahoo Data Breaches Across 4 Years Result in a $117.5 Million Settlement -Cybersecurity Hub
    • Myths in your SOCs
    • Más de la mitad de los empleados no se adhieren a los protocolos de seguridad de correo electrónico
    • NASA embracing automation in move to zero-trust security architecture - FedScoop
    • NCSAM: The Insider Threat to Cybersecurity
    • NetIQ User Group Meetup: Mastering Application Integrations for Privileged Users and Accounts | May 5th | 8:30 a.m. PDT
    • New Cloud Security Alliance Survey Finds Uneven Adoption of Emerging Technologies
    • New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report
    • New DHS guidance to address long-standing network issues as telework exacerbates the problems
    • New Digital Badges for Micro Focus Certification
    • New ebook: Enterprise and Cyber Resiliency
    • New infosec products of the week: January 17, 2020
    • New Mexico National Labs/DoD Virtual IT & Cyber Day, Jan. 21
    • New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec
    • New NSA cyber directorate prioritizes standards for security of military's emerging tech - FedScoop
    • New Reseach: These Are the 15 Top Cyber Threats Now
    • New Security Podcast: Reimagining Cyber – so much more than Cybersecurity
    • New Study: Hospital Breaches Could Be Killing Patients
    • New TechBeacon Lookbook "Special Report: National Vulnerability Database Analysis "
    • New US Federal Privacy Bill Proposed
    • New US Privacy Bill Would Intro Jail Time for CEOs
    • New Year – New Solution! Introducing Voltage SmartCipher
    • New York CISO Virtual Executive Summit: Strengthening Your Security Operations Center, June 1
    • New York City Virtual Cybersecurity Summit - Data Connectors, Aug 19-20
    • News Summary About Latest Cybersecurity Stories
    • News Summary About Latest Cybersecurity Stories, April 19
    • News Summary About Latest Cybersecurity Stories, Feb 22nd
    • News Summary About Latest Cybersecurity Stories, March 15
    • News Summary About Latest Cybersecurity Stories, March 1st
    • News Summary About Latest Cybersecurity Stories, March 31
    • News Summary About Latest Cybersecurity Stories, March 8
    • NIS Investments Cybersecurity Report
    • NIST exploring possible DevSecOps framework for agencies - FedScoop
    • NIST Privacy Framework: How to put this GDPR and CCPA guide to work
    • NIST provides guidance to protect controlled unclassified information
    • NIST Ransomware Detection and Response Guide: Call for Comments
    • NIST Unveils Updated Guide to Privacy, Security Controls
    • NorthShore health system says personal information of 348K people potentially exposed in data breach
    • Notre Dame blaze: fire experts on safeguarding heritage sites - IFSEC Global
    • Now Live: Cybersecurity Summit 2019 On Demand
    • NSA Announces New Cybersecurity Collaboration Center
    • NSA warning on location tracking: ‘Stop using your phone’
    • October is National Cybersecurity Awareness Month and Here are Best Practices for Orgs
    • On Demand Webinar: Best Practices for Cyber Liability Insurance Renewals: A Roundtable Discussion with IDMWORKS and CyberRes
    • On-demand lookbooks
    • ON-demand Webinar Series: Breach Defense: Part 1 - Anatomy of a Breach
    • On-demand webinar. Data protection: Your biggest reputational risk?
    • On-Demand Webinar: A Global Data Privacy Review
    • On-demand Webinar: A Unified Approach to Data Life Cycle Management and Security
    • On-demand Webinar: Best Practices for taking control of privilege in your organization
    • On-demand webinar: California’s own GDPR? It’s not alone
    • On-demand Webinar: Close the gap in your ransomware defense
    • On-demand Webinar: Cross Border Data Transfer: Issues and Strategies
    • On-demand Webinar: Discover, protect, and control access to data to lower privacy risk
    • On-demand webinar: Discover, protect, and control access to data to lower privacy risk (1763018)
    • On-demand Webinar: Ensure Privacy Protection Through Your Digital Transformation
    • On-demand Webinar: Fitting Security into your Software Lifecycle: Automation and Integration
    • On-demand webinar: Get Started with Seamless AppSec in One Day
    • On-demand webinar: Next Generation Cloud Services for Reducing Software Supply Chain Risks
    • On-demand Webinar: Security and Privacy: Two Sides of the Same Coin?
    • On-demand Webinar: Supercharging Behavioral Analytics with CrowdStrike EDR
    • On-demand Webinar: The Week that Data Privacy Became Personal!
    • On-demand Webinar: Universal Policy Administrator (UPA) - Keeping Your Security Policies Current
    • On-demand: Kick off 2021 with a Cyber Resilience Fireside Chat
    • On-demand: Modernizing Missile Defense
    • One of the US’s largest insurance companies reportedly paid $40 million to ransomware hackers
    • One third of cybersecurity workers have faced harassment at work or online - this initiative aims to stamp it out
    • Online Event: Identity - Key to Zero Trust Security | January 20, 2022 | 8:00am MST
    • Online Event: Threat Intelligence for Security Digital Value Chain | January 27, 2022 | 12:20PM EST
    • Only a Quarter of Orgs ‘Focus’ on Cyber-Attack Prevention
    • Open Horizons Virtual Summit 2020
    • OptivCon Toronto, May 22: Join the Micro Focus Security, Risk and Governance team
    • OWASP API Security Top 10: Get your dev team up to speed
    • OWASP Global AppSec - DC 2019, Washington, Sept. 9 - 13
    • OWASP Global AppSec Training & Conference | Dublin | February 13th - 16th
    • OWASP Tampa Chapter Lunch 'n Learn 2019, March 8
    • Parent company of more than 60 restaurant chains warns customers of potential data breach
    • Payroll Data of 29,000 Facebook Employees Stolen: Report
    • Pentagon planning for the next 25 years of cybersecurity
    • Philadelphia Virtual Cybersecurity Summit - Data Connectors, May 7
    • Photos from the Micro Focus Cybersecurity Summit, June 11-13, 2019, in Dallas
    • Plugging the insecurity hole in rapid application rollout - FutureCIO
    • Podcast Series: Cyber Resilience Esp. 1 - Being Cyber Savvy with Kris Budnik from Federal National Bank
    • Podcast: Building a positive and modern culture of security with Michele Hanson, CISO at Micro Focus
    • Podcast: Smart Cities, Hair Dryers, Cyber Intel Sharing… Oh My! The Intricacies of Cybersecurity
    • Podcast: Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues
    • POLL: CyberRes Customers: How Would You Prefer to Receive Knowledge Docs?
    • Popia holds no fear for South African organisations - TechCentral
    • Por qué el cumplimiento continuo y DevOps aumentan la seguridad
    • Portland Vivit User Group Event on Micro Focus Fortify
    • Pourquoi les CTO doivent s’intéresser à Micro Focus Realize 2021 ? (article in French)
    • Pozvánka na Micro Focus Experience Tour 2019
    • Preinstalled mobile malware steals money in emerging markets
    • Premium Support - Services
    • Premium Support Hub - Access to Senior Support Experts at Micro Focus Universe
    • Press Release: AppSec Company Debricked has been acquired by CyberRes
    • Press Release: CyberRes Partners with Google Cloud
    • Press Release: CyberRes Respects Data by Becoming a 2023 Data Privacy Champion
    • Press Release: CyberRes Supports Cybersecurity Awareness Month to Sound the Alarm on Digital Security and Encourage Personal Data Protection
    • Privacy and Data Protection, Regulatory Compliance - Yes, You Can Have it All
    • Privacy engineering: How DevOps delivers beyond app sec
    • Privacy in the United States: A State by State Privacy Law Review, Webinar Series - Sept. 5
    • Privacy, Compliance & Governance | 2019 Micro Focus Universe on Demand
    • Privacy: Data Protection & Identity
    • Privacy: Where Security and Ethics Miss the Mark
    • Privacy: Where Security and Ethics Miss the Mark - Security Boulevard
    • Privileged Account Manager 3.5 Administration training course
    • Problems Solved by DevSecOps - DZone DevOps
    • Protect 2006 presentations
    • Protect 2007 presentations
    • Protect 2008 presentations - part - 9
    • Protect 2008 presentations - part 1
    • Protect 2008 presentations - part 10
    • Protect 2008 presentations - part 2
    • Protect 2008 presentations - part 3
    • Protect 2008 presentations - part 4
    • Protect 2008 presentations - part 5
    • Protect 2008 presentations - part 6
    • Protect 2008 presentations - part 7
    • Protect 2008 presentations - part 8
    • Protect 2011 presentations - part 1
    • Protect 2011 presentations - part 2
    • Protect 2011 presentations - part 3
    • Protect 2011 presentations - part 4
    • Protect 2011 presentations - part 5
    • Protect 2012 presentations
    • Protect 2015, Washington
    • Protect 2015, Washington, part 2
    • Protect 2015, Washington, part 3
    • Protect 2015, Washington, part 4
    • Protect 2015, Washington, part 5
    • Protect 2015, Washington, part 5 (1791376)
    • Protect 2015, Washington, part 5 (1791378)
    • Protect 2015, Washington, part 6
    • Protect 2016 presentations: ArcSight day 1, part 1
    • Protect 2016 presentations: ArcSight day 1, part 2
    • Protect 2016 presentations: ArcSight day 1, part 3
    • Protect 2016 presentations: ArcSight day 1, part 4
    • Protect 2016 presentations: ArcSight day 2, part 1
    • Protect 2016 presentations: ArcSight day 2, part 2
    • Protect 2016 presentations: ArcSight day 2, part 3
    • Protect 2016 presentations: ArcSight day 2, part 4
    • Protect 2016 presentations: ArcSight day 2, part 5
    • Protect 2016 presentations: ArcSight day 2, part 6
    • Protect 2016 presentations: ArcSight day 2, part 7
    • Protect 2016 presentations: ArcSight day 3, part 1
    • Protect 2016 presentations: ArcSight day 3, part 2
    • Protect 2016 presentations: ArcSight day 3, part 3
    • Protect 2016 presentations: ArcSight day 3, part 4
    • Protect 2016 presentations: Fortify
    • Protect 2017 - Investigate Visual Analytics
    • Protect your business from loss of revenue and reputational damage
    • Protecting data today requires a comprehensive and scalable security solution
    • Protecting Relational Databases
    • Protecting your business with Cyber Resilience at the core
    • Protecting your unstructured data – shouldn’t it be on your radar?
    • Protection Strategies for a Cyber-Resilient Organization
    • Put OWASP Top 10 Proactive Controls to work
    • PwC trusts Micro Focus Security Solutions to help solve clients’ complex security problems
    • PwnedPiper PTS Security Flaws Threaten 80% of Hospitals in the U.S.
    • Q & A Live Session, May 21 from 1:00 – 3:00 p.m. CDT in the Community!
    • Q & A Sessions in the Online Community– Your Hottest Security Questions
    • Q&A: Critical Infrastructure, Supply Chain and Data Exploitation’s Impact on National Security
    • Quantum Computing & the Quantum Threat with Michele Mosca
    • Radical Innovation is the name of the game
    • Ramsés Gallego (CyberRes) on Protecting the Enterprise in a Cloud-Native, Post-Pandemic Age - CEO.digital
    • Ransomware Attacks are Impacting National Security
    • Ransomware disables Cleveland airport's email systems, info screens
    • Ransomware impacts skyrocket 60 percent, cyber losses double in 2018
    • Ransomware Volumes Hit Record Highs as 2021 Wears On
    • Ransomware with ZENworks - YouTube
    • Ransomware, Mobile Malware Attacks to Surge in 2020
    • Ransomware: Preventing Hostage Data
    • Ransomware: Preventing Hostage Data (1766603)
    • Ransomware: Preventing Hostage Data. New InfoSec paper!
    • Ransomware: Still Going Strong 30 Years On
    • Red Cross breach could happen to any organization, security community warns
    • Redmond Intelligence whitepaper: Best Practices for Running Office 365 in a Hybrid World
    • Reducing Cost and Increasing Performance of Implementing Data Security
    • Reducing data costs without jeopardizing growth
    • Reflections on NIST SP800-160 Vol 2: Developing Cyber Resilient Systems
    • Register for this AFCEA DC Virtual Event Series, March 11 (Government Solutions)
    • Register for this AFCEA DC Virtual Event, Feb 9
    • Registration Opens for Girls’ Free Cybersecurity Training
    • Reimaging Cyber Podcast: Episode 30 - Governing an AppSec Program by Empowering Dev Teams
    • Reimagining Cyber Podcast
    • Reimagining Cyber Podcast - Episode 21 Rerun: Cyber - How to get People to Care
    • Reimagining Cyber Podcast: Discussing Healthcare and Cybersecurity with Louis Lerman
    • Reimagining Cyber Podcast: Episode 41 - Do a Little Dance... Time for Some SLSA
    • Reimagining Cyber Podcast: EXTRA - State of Cyber 2023 review
    • Reimagining Cyber Podcast: How CREST and OWASP are Creating a New Global Standard for AppSec
    • Reimagining Cyber Podcast: U.S. Strategy to Develop a Superior Cybersecurity Workforce
    • Remote employees find workarounds to company security policies, say 52% of tech leaders in study
    • Remote-work and burnout: 10 ways to avoid it on your tech team
    • Report Reveals Shifting Trends in Cloud Computing Usage and Data Center Density
    • Report: Build resilience for any scenario
    • Researchers discover new vulnerability affecting billions of computers globally
    • Retailers prioritise cybersecurity over customer experience in quality assurance, finds Capgemini
    • Review us on G2!
    • Revised Directive on Security of Network and Information Systems - Shaping Europe’s digital future
    • Revista CSO ESPAÑA - CIBERSEGURIDAD 2020 (in Spanish) y evento on demand
    • Rocky Mountain Cyberspace Symposium 2020
    • Rocky Mountain Information Security Conference, Denver, June - 6
    • ROI calculator finds out how much the NetIQ Identity and Access Solutions can save your organization
    • Roundtable Discussion: Best Practices for Cyber Liability Insurance Renewals | October 18 | 2:00 PM EST
    • Router Cryptojacking Campaigns Disrupted
    • RSA 2019: 10 Execs On The Cybersecurity Leader They Look Up To Most
    • RSA Conference 2019: Zero Trust, AI, NSA, DevSecOps—and Facebook?
    • RSA Conferences, USA 2014 - 2018, Moscone Center, San Francisco
    • RSA Meeting Center - Request a meeting | RSA Conference | San Francisco & Digital | June 6 - 9
    • RSAC 2019: Better, wetter—and weirder
    • RSAC 2020: Post-Conference Highlights  
    • RSAC Unplugged 2019: Bangkok as part of Thailand Cybersecurity Week
    • Run and Transform with Micro Focus and Jaguar Racing
    • Rush reports data breach involving 45,000 patients
    • Safer Application Delivery with RASP
    • Safer Internet Day 2021 – The experts have their say - Security IT Summit
    • San Antonio & Austin Virtual Cybersecurity Summit - Data Connectors
    • Saudis hacked Amazon chief Jeff Bezos's phone, says company's investigator
    • SAUTER Group uses Micro Focus ZENworks to provide better service and lower admin costs
    • SC Magazine Review of ArcSight ESM 7.2
    • SC Product Reviews: SIEM
    • Scale your security with DevSecOps: 4 valuable mindsets and principles
    • Scaling enterprise security testing
    • Scripps Notifying 147K People of Data Breach
    • Seamlessly Build DevSecOps into AWS CI/CD Pipelines with CyberRes Fortify | Sept. 15, 2022 | 8:00 AM PDT
    • SecOps: Clear opportunities for powerful collaboration
    • SecTor 2019: Experts say more resources needed to meet cybersecurity skills shortage
    • SecTor 2020 Virtual Conference, Oct. 17-22
    • SecTor 2022 Conference | October 5-6 | Toronto
    • Secure Your Cloud Data | AWS Immersion Day | July 12
    • Secure your value chain: Emerging trends and best practices
    • SecureGuild 2019, May 20-21 2019 - digital conference
    • SecureGuild conference, we offer you a 30% off registration! May 20-21
    • Securing a distributed workforce in a post-pandemic world
    • Securing Data Monetization in ASEAN | Micro Focus
    • Security Bulletin for CVE-2022-3786 and CVE-2022-3602
    • Security Champions – they can help put the “SEC” in DevSecOps – Connect Converge
    • Security Cleared EXPO | November 1st | QEll Centre London
    • Security Company Seemed To Have Inadvertently Exposed Its ‘Leaks Database’ with 5B Records
    • Security Education Conference Toronto, Oct 9 - 10
    • Security Engage Newsletter - December 2019
    • Security Engage Newsletter - December 2020
    • Security Engage Newsletter - February 2021
    • Security Engage Newsletter - January 2020
    • Security Engage Newsletter - June 2020
    • Security Engage Newsletter - March 2020
    • Security Engage Newsletter - March 2021
    • Security Engage Newsletter - May 2020
    • Security Engage Newsletter - October 2020
    • Security Engage Newsletter - September 2019
    • Security Engage Newsletter - September 2020
    • Security Engage Newsletter – August 2020  
    • Security Engage Newsletter – January 2021
    • Security Engage November Newsletter
    • Security from day zero
    • Security in DevOps Like a Boss with Tanya Janca
    • Security Leadership Conference Belgium | October 5 | BluePoint, Brussels
    • Security lessons for 2020 from 2019 | CIO East Africa
    • Security Now a “Thankless Task” For 80% of IT Teams
    • Security Operations and How to Defend Against COVID-19-themed Cyber Threats
    • Security or Collaboration: Can We Have Both?
    • Security Podcast: Colonial Pipeline fuels the fire
    • Security Podcast: Connected Vehicles and the Cyber Equivalent of Seatbelts and Airbags
    • Security Podcast: Cyber Must Become Resilient, with NIST Fellow Ron Ross
    • Security Podcast: Cybersecurity and the Modern CISO
    • Security Podcast: Measuring Cyber Resilience
    • Security Podcast: Powering Your Cyber Strategy
    • Security Podcast: Reshaping Business through Cyber Innovation
    • Security Podcast: So you’ve been hacked, now what?
    • Security Podcast: The Evolution of Cybersecurity to Cyber Resilience
    • Security Podcast: The New Normal in a Post-Pandemic World
    • Security Podcast: Today, Everyone Needs to be Cyber Savvy
    • Security Podcast: Unconventional approaches to improve enterprise resilience
    • Security Podcast: What does sociotechnical research have to do with cybersecurity?
    • Security shortcomings impacting business performance for many firms
    • Security spending will top 40% in most 2021 IT budgets
    • Security startup Verkada hack exposes 150,000 security cameras in Tesla factories, jails, and more
    • Security Trends On-Demand Webinar: DevSecOps
    • Security Trends On-Demand Webinar: General Data Protection Regulation
    • Security Use Cases by Industry
    • Security, Risk & Governance Sessions at Micro Focus Universe Europe
    • Security, Risk & Governance track at Micro Focus #virtualUniverse
    • Security, Risk and Governance - The Cornerstone of Digital Transformation (DX)
    • Security, Risk and Governance Tracks at Micro Focus Virtual Universe, March 17 -19
    • See how IT Provider RZZ Rechenzentrum leverages Micro Focus ZENworks
    • See how Montferland Government uses Micro Focus ZENworks and Collaboration solutions
    • See how to Secure the Value Chain with Cyber Resilience
    • See How Zero Trust Turns SSO on its Head at Micro Focus Universe
    • Senate investigation finds multiple federal agencies left sensitive data vulnerable to cyberattacks
    • Senate turns up a decade of federal cybersecurity failure -- FCW
    • Senior Account Executive, Voltage Data Security Products job at Micro Focus
    • Sephora online users in Southeast Asia, Australia, New Zealand hit by data breach
    • September is National Insider Threat Awareness Month
    • Serie de Webinars CyberRes: Evolucionar sus estrategias de defensas contra ciberamenazas
    • SF pension data breach may have exposed city retirees' bank, tax information
    • SHARE Fort Worth, Feb 23-28: Practical Steps to Quickly Implement Better Mainframe Access, and other
    • SHARE Fort Worth, TX, Feb 23-28
    • Sherlock Holmes or Dr Watson? It is all about (Cybersecurity) intelligence!
    • Shift to cyber resilience: 7 steps to a better security approach
    • Sicherheitsrisiken mindern, Datenschutz gewährleisten
    • Sin seguridad no hay privacidad
    • Single sign-on still open to attack: An inside look
    • Skimming Campaign for Stolen Credit Card Data Leveraged Heroku Cloud Platform
    • Smart Digital Transformation Lookbook
    • Smarter SecOps in The Hague at Micro Focus Universe
    • SMB Study Reveals Majority of Small Businesses Aren't Taking Cyber Attacks Seriously
    • So sichern Sie, was Ihnen am Wichtigsten ist (in German)
    • So you want to be a security pro? 4 ways to break into the field
    • SOAR: Transforming the Security Operation Center
    • SOC teams spend nearly a quarter of their day handling suspicious emails
    • SoCal Virtual Cybersecurity Summit - Data Connectors, Oct 14-15
    • Software Security is National Security
    • SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security
    • SolarWinds: Bringing Down the Building... Software Supply-Chain Pressure Points 
    • Solutions de gestion sécurisée du contenu et mise en conformité des données sensibles
    • Solutions Review Presents: The Top Data Breaches of 2020, in Video Form
    • Solve your business continuity challenges: 3 Month Free License for Adoption Readiness Tool ART
    • Solving The Cyber-Resilient Puzzle And Maintaining A Secure Workforce
    • South Africa's Tarsus Partners with Micro Focus on CyberRes
    • Space Force’s SMC Cyber Day | October 13
    • Spearphishing Campaign Exploits COVID-19 To Spread Lokibot Infostealer
    • Spotify notifies customers of breach, files under CCPA
    • Spotlight Series: Women in Cyber - Marianne van der Pluym
    • Spécial FIC - « En 2020, Micro Focus lancera 3 nouveaux produits » Christophe Gaultier- Micro Focus
    • SRG Keynote | Micro Focus Micro Focus Business Continuity Dialogue 2020 |15 July
    • Stalker Online Breach: 1.3 Million User Records Stolen
    • State and local government urged to fight ransomware
    • State and Local Governments are Under Siege from Cyberattacks – it’s Time to Act
    • State of Security Operations - Video Series: Ep. 1 Security Analytics and Data with Stephan Jou
    • State of Security Operations - Video Series: Ep. 2 The Remote SOC with Stan Wisseman
    • State of Security Operations - Video Series: Ep. 3 Gaining Board Confidence with Jim Foote
    • State of Security Operations - Video Series: Ep. 4 Preemptive Threat Detection with Ramsés Gallego
    • State of Security Operations - Video Series: Ep. 5 The Future of SecOps w/ Rob Aragao
    • State of Security Operations 2019: 5 challenges for SOC teams
    • State of the software supply chain: Machines will make software faster
    • Staying Cyber Resilient at Micro Focus Universe | March 22-23, 2022
    • Stop saying no: Why data sharing is a good thing (really)
    • Strategic partners: Micro Focus and DXC – Outthink. Outpace. Outperform.
    • Strictest digital privacy law in the United States becomes law in California in 2020
    • Succeeding with your open source strategy as an SMB | Debricked
    • Summer To-Do List – Cybersecurity Slip Sliding Away
    • Supply chain insecurity: Keep your eyes on the road with Ruby on Rails
    • Support and Training Video: SLD Portal Login
    • Survey Reveals the Importance of Continuous Security Amidst the COVID-19 Outbreak
    • Så kan företag stärka sin motståndskraft mot säkerhetsattacker (article in Swedish)
    • Sécurité des applications: quoi de neuf dans la version Fortify 20.1? (French)
    • Taking a Security-First Approach to Smart Cities
    • Task force seeks to create unified resource for artificial intelligence innovation
    • Tech Focus AppSec webinar: Learn about Fortify SCA’s latest features, Nov. 21
    • Tech Focus SRG Virtual User Group: Data Privacy Management with Micro Focus SCM suite, Feb 13
    • Tech Focus User Group: Scaling application security testing, Nov. 21
    • Tech Focus Virtual User Group: Identity Modernization--The Path to Achieving Continuous Compliance
    • Tech Talk Thai: โหลดฟรี "DevSecOps: A Framework for Digital Innovation" จาก Micro Focus
    • Tech Talk: Better cybersecurity starts with honesty and accountability
    • Tech-Trends 2021: Ein Kompass für das kommende Jahr (article in German
    • Technical Insight Series: Software License & Downloads (SLD), Recording available now!
    • Technical Insight Series: Support Tools - like the portal, recording available now!
    • Technical Insight Series—Put the spotlight on your expertise
    • Technical Insights Series: Secret vault implementation challenges, Oct. 27
    • Technology Readiness Assessment: Where does your organization stand?
    • Ten Identity Governance and Administration Vendors to Watch in 2020
    • Ten things we can learn from Canada about responsible AI
    • Texas Health Agency Fined $1.6m for Data Breach
    • Texas Pummeled by Coordinated Ransomware Attack
    • The 20 Coolest Identity Access Management And Data Protection Companies Of 2020: The Security 100
    • The 3 deadly sins of insecure programming
    • The 5 Compliance Challenges, Webinar on May 27
    • The best AI, analytics, and big data conferences of 2021
    • The Best Cybersecurity Predictions For 2021 Roundup
    • The best DevOps conferences of 2021
    • The best security conferences of 2019 
    • The best security conferences of 2020
    • The best security conferences of 2021
    • The biggest hacks, data breaches of 2020
    • The blurring lines between DevSecOps and DevOps
    • The business case for responsible AI
    • The Business of Responsible AI
    • The Cloud Security Alliance Technology and Cloud Security Maturity Survey
    • The Colonial Pipeline Hack Is a New Extreme for Ransomware
    • The COVID-19 Checklist: Detailed Steps to Better Protect Your Organization
    • The cybersecurity jobs crisis is getting worse, and companies are making basic mistakes with hiring
    • The dangers of assumptions in security
    • The Data Privacy Trap
    • The Data Protection Stack
    • THE DEVELOPERS Conference Partner | 17 June 2021
    • The diagnosis for US electronic health records: Fatally flawed
    • The essential GDPR guide: 18 resources to get privacy-compliant
    • The fading distinction between DevOps and DevSecOps - DevOps Online
    • The FBI is breaking into corporate computers to remove malicious code
    • The GDPR paradox: how data regulation creates revenue streams
    • The Good and the Bad in the Global State of Cybersecurity
    • The Life Cycle of a Breached Database
    • The medical data of millions of Americans is at risk with Google's Nightingale Project
    • The Most Recent Data Breaches - July 2022
    • The NetIQ IAM portfolio has Achieved a Major Milestone – Did You Notice?
    • The new lineup of 2020 ZENworks Community Webinars is here!
    • The New Risk Equation: Motives, Means, Opportunity
    • The pandemic and your remote workforce: 9 ways to stay secure
    • The Payments Ecosystem: Security Challenges in the 21st Century
    • The Perils of Not Modernizing an Agency’s Applications
    • The POPIA opportunity
    • The race to achieve GDPR excellence
    • The role of FS in a world where data privacy is key
    • The Role of the CIO During the Era of DX
    • The Role of Zero-Trust Security in the Remote Workforce Webinar - ATARC, May 7
    • The RSA Conference Teaches Resilience, May 17 - 20
    • The secret diary of a security event crasher....
    • The SolarWinds Orion attack illustrates the importance of Cyber Resilience
    • The state of MFA: 4 trends that portend the end of the solo password
    • The State of SecOps: It's time to think beyond the SOC
    • The state of the cybersecurity job field: 5 key factors you need to know
    • The Thing About Security - from DevOps to DevSecOps: Why a "Shift Left" is Worthwhile (German)
    • The three most dangerous attack vectors
    • The Times They Are a-Changin’: Strategize and Evolve
    • The top 10 data breaches of 2020
    • The Top 12 Data Breaches of 2019
    • The Top 7 Trends in Enterprise Security Software and Why They Matter
    • The Tragic Downside of Customer Information Management
    • The US Is Number One for Data Theft
    • The week that Data Privacy became personal!
    • The year ahead: Security experts predict 21 key trends for '21
    • The ‘Frankencloud’ model is our biggest security risk
    • Think 'next normal': 4 cyber-resilience lessons from the pandemic
    • Think bigger for a big win with cyber-resilience
    • This might be the mother of all password leaks, with billions of credentials exposed
    • This ransomware has returned with new techniques to make attacks more effective
    • This trojan malware is now your biggest security headache
    • Threat model at scale: How to go from policy to execution
    • Threat Research for CISO's Introducing CyberRes Galaxy | Online Event | January 18, 2022
    • Threat Research for CISO's: Introducing CyberRes Galaxy | Linkedin Live Event | January 18th
    • Tightening Mainframe Access and Security: Part 3
    • TikTok kid schools IT about scam apps
    • Time to take them seriously, what's Iran doing in cyber?
    • Tipps und Tools reduzieren interne Risiken | MIDRANGE
    • Tips for a smooth DevSecOps transformation
    • Tips to stay Cyber Safe for Thanksgiving, Black Friday and Cyber Monday
    • To bring strategy back into your security, turn to chess
    • Today’s ‘mega’ data breaches now cost companies $392 million to recover from
    • Tokyo Games organizers latest to be hit by data breach, info leak
    • Top 5 Data Breaches in History
    • Top Application Security  Products | eScurity Planet
    • Top Reasons to Attend Micro Focus Universe
    • Top security predictions for cyber resilience in 2022 – Part 1
    • Top technology predictions for 2021
    • Top tools and best practices to kick-start your shift to cyber resilience
    • Top Women Cloud Influencers in 2023 - Whizlabs
    • Toyota Australia, Healthcare Group Hit By Cyberattacks
    • Tracking endpoints and ensuring device security a vexing problem for healthcare CIOs
    • Transformational CISO Assembly – The Millennium Alliance, Nashville, Nov 19 and 20
    • Tre enkle grep for sikre applikasjoner (article in Norwegian)
    • Tutta l’esperienza di Micro Focus nella sicurezza resiliente di CyberRes (article in Italian)
    • Tutta l’esperienza di Micro Focus nella sicurezza resiliente di CyberRes (in Italian)
    • Two simple steps to strengthen defense against ever evolving ransomware
    • Two Years In, IT Thought Leaders Judge GDPR's Impact
    • Télétravaillez toute sécurité !
    • Télétravaillez toute sécurité ! (2796763)
    • U.S. has almost 500,000 job openings in cybersecurity
    • UK consumers more likely to abandon a breached company | SC Media
    • UK Cyber Security Council welcomed
    • UK Fines Dixons Carphone for Massive Breach
    • UK National Cyber Security Center Warns of Increased Threat of Ransomware Attacks
    • UK&I Summit - Solve your digital Dilemma | June 9, 2022
    • Una sicurezza olistica e intelligente per dati, identità e applicazioni
    • Understanding the Importance of Cybersecurity as Organizations Adopt Cloud
    • Undisclosed number of TurboTax accounts breached | SC Media
    • Unemployment Data Leaked: Names, Full SSN, Addresses
    • Unemployment Data Leaked: Names, Full SSN, Addresses (2805162)
    • Unifying physical security and cybersecurity at the Converged Security Centre - IFSEC Global
    • Universe 2020: IT-Sicherheit im Fokus | Micro Focus Blog
    • Universe 2021 - Cyber Resilience Agenda
    • Universe 2022: Top ten reasons to watch Universe on-demand
    • Universe Conference: CyberRes "Live Studio" Available during Conference hours
    • Universe on Demand is here!
    • Universiti Malaya, JPDP looking into report of massive data breach affecting the university
    • Unleash the Potential of Your Big Data
    • Unsupervised Anomaly Detection: Insider Threat
    • Update your cybersecurity practices: Shift to cyber resilience
    • US Public Sector Tech Talk Series: Making DevSecOps work for your US Public Sector agency
    • US Public Sector: Extending Zero Trust Architecture to Mitigate Insider Threats
    • User Forum 2014 ArcSight presentations
    • Using Machine Learning to Address Evolving Threats - Security Boulevard
    • Using market incentives to improve cybersecurity
    • Validate your skills and accelerate your career
    • Varför är maskininlärning beroende av mänsklig inlärning?, 21 januari, 2021
    • Veranstaltungsseite: Realize 2021 DACH (in German)
    • Veterans' records, personal information exposed in data breach
    • Video: A Journey in MFA at the BMW Group
    • Video: Adding Additional Capacity to an Existing License Key
    • Video: AI for Cybersecurity
    • Video: ArcSight Data Platform Transforms Data Chaos into Security Insight
    • Video: Breach Defense with ZENworks
    • Video: building a modern data security program, Protect 2016
    • Video: Customer Portal - General Navigation
    • Video: Customer Portal - Knowledge Content Search Overview
    • Video: Customer Portal - Login and Access
    • Video: Cyber Resilience - Detect
    • Video: Cyber Resilience - Evolve
    • Video: Cyber Resilience - Protect
    • Video: CyberRes Overview 2021
    • Video: CyberRes Partnerships
    • Video: DevSecOps, le nouveau graal des DSI (en francais)
    • Video: Enabling a Secure Software Supply Chain for Business Resiliency
    • Video: Fortify on Demand (FoD) Reports (2019)
    • Video: Fortify on Demand - Reviewing Static Scan Results
    • Video: Future proof your organisation against cyber crime
    • Video: Getting Started In AppSec in One Day (2019)
    • Video: GovInsider’s Live Studios - Will We Ever Be Safe Online?
    • Video: How Micro Focus Customers Adapt to Evolving Market Requirements
    • Video: How to register to an online course or exam from your Digital Learning Bundle
    • Video: Industry Trends for CyberSecurity
    • Video: Intelligent GSOC from Vidsys Micro Focus 
    • Video: Istanbul Grand Airport's Digital Transformation with Micro Focus
    • Video: Jenkins Plugin for Fortify SCA/SSC to automatically upload projects (2019)
    • Video: Managing Security in a Decentralized World
    • Video: Micro Focus DevSecOps - Scale for Digital Innovation (Thai sub-titles)
    • Video: Micro Focus DevSecOps - Skala untuk Inovasi Digital (with Indonesian sub-titles)
    • Video: Micro Focus DevSecOps Deliver Speed, Quality and Security
    • Video: Micro Focus New Community Tour
    • Video: Micro Focus Security, Risk and Governance Solutions Overview
    • Video: Micro Focus Solution Highlight for Hyper Connectivity – Risk-based Authentication
    • Video: Mom Don't Click That - Featuring Micro Focus’ Jim Foote
    • Video: NetIQ Unplugged: Zero Trust Overview Part 1
    • Video: Next-Gen SOC | Episode 1: Intelligent Security Operations
    • Video: Next-Gen SOC | Episode 4: SecOps and the MITRE ATT&CK Framework
    • Video: PwC Trusts Micro Focus Security Solutions to Help Solve Clients’ Complex Security Problems
    • Video: SQL Injection Web Attack (Live Demonstration for AppSec) - YouTube
    • Video: The UK Customers’ Top Data Privacy and Protection Concerns
    • Video: What to expect: Micro Focus Realize 2019
    • View the Data Privacy session at Micro Focus #virtualUniverse
    • Virtual Event: DevSecOps Leaders in a High Tech World, October 7th
    • Virtual Event: Doing More IT with Less: Economizing and Innovating in Today's IT Organization, 23/7
    • Virtual Event: Empower Your SOC Pros To Focus On What Matters | Thursday, December 9, 2021 | 11:00 a.m. EST
    • Virtual Event: Micro Focus Business Continuity Dialogue 2020, July 15-16
    • Virtual Happy Hour and Digital Transformation Discussion
    • Virtual RSA Conference Meeting Request, May 17-20
    • Virtual Security Operations User Group 2020 -- 25th June 2020
    • Virtual UK&I Micro Focus Realize 2020, July 2nd
    • Virtual Universe Security, Risk & Governance DEMOs are now available
    • Visit CyberRes at the RSA Conference Digital Marketplace, May 17-20
    • Vistaprint left thousands of customer chats and calls online – TechCrunch
    • Voltage User Group Meeting
    • Volume and Size of Fines for Data Breaches Expected to Rise
    • Walmart Sued Under CCPA After Data Breach Incident
    • WannaCry? Not anymore. Software vulnerability tracking debuts in ZENworks2020!
    • Watch out, cryptography!
    • Wearable Tech in Healthcare: Possibilities and Pitfalls
    • Weaving the Next-Gen Tech Leaders--Women Tech Leaders India Awards
    • Webinar - Improve your Infrastructure Resilience with Orchestration, Oct. 6
    • Webinar - Risk Below Zero User Group, 16 September
    • Webinar - Seguridad | Automatice y Simplifique la protección de datos personales, 27 de Mayo
    • Webinar - The most Adaptable and Secure Host Connectivity Solution, Jan 23
    • Webinar 3: Find. Fix. Fortify – End-to-end application security, Oct. 15
    • Webinar CyberRes | El arte de la protección y privacidad de datos, 22 Abril (in Spanish)
    • Webinar Fortify - Analyse de code dynamique (DAST/IAST), mai 15
    • Webinar Fortify - Analyse de code statique (SAST)bb, mar. 19 mars (en francais)
    • Webinar II: State of Zero Trust - Latest Insights from NetIQ | October 4th | 10:00 a.m. EST
    • Webinar mit IDC, SIX AG und Micro Focus: Ist Ihr Unternehmen cyber-resilient? 24. Juni (in German)
    • Webinar, Data protection: Your biggest reputational risk? April 16
    • Webinar: 2021 Predictions: The Path to Cyber Resilience, December 9
    • Webinar: Password-less Access: Give Your Users Easier Access - As You Actually Improve Your Risk Management | September 28, 2021
    • Webinar: State of Security Operations: Insights and Implications, Aug 3
    • Webinar: 2021 Predictions-- The Path to Cyber Resilience, Dec 9
    • Webinar: A journey in MFA at the BMW group
    • Webinar: A Risk-Based Approach to Security, April 28
    • Webinar: A Zero Trust Approach to Becoming Cyber Resilient, Aug 24
    • Webinar: Adding Intelligence to Adaptive Access, October 7, 2020
    • Webinar: Android Enterprise with ZENworks 2017 Deep Dive part 2, March 6
    • Webinar: API Security--The New Attack Surface! Aug 13
    • Webinar: Behind the Privacy Shield: The Art of Data Protection Oct. 8
    • Webinar: Being Cyber Resilient During, After and Beyond Covid-19, Jan 15
    • Webinar: Best Practices for taking control of privilege in your organization
    • Webinar: Boost User Adoption with the Adoption Readiness Tool (ART)
    • Webinar: Bring Your Own Encryption in a Hybrid and Multi-cloud World, Aug 11
    • Webinar: California's own GDPR? It's not alone. Jan. 28
    • Webinar: CIAM Done Right: An Engaging Roundtable Discussion Featuring Novacoast and CyberRes | October 5th | 2:00 PM EDT
    • Webinar: CIAM Scenarios - A Roundtable Presented by CyberRes and CIS | October 4th | 2:00 PM EDT
    • Webinar: Close the gap in your ransomware defense, March 21
    • Webinar: Cloud migration with confidence – Securing multi-cloud and hybrid IT, April 13
    • Webinar: Conquering the Authentication Challenge of Zero Trust, June 2nd
    • Webinar: Critical Lessons Learned While Adopting a DevOps Lifecycle for SecOps using Agile, 24.4.19
    • Webinar: Cross Border Data Transfer: Issues and Strategies, Dec 5
    • Webinar: Cyber Resilience in a Digital Transformation Journey (incl. IDC recommendations) - Jan 12
    • Webinar: Cyber Resilience: Building Intelligent (Business-Oriented) Threat Operations, Mar 9
    • Webinar: Cybersecurity Executive Order Challenges and Strategies, July 27
    • Webinar: Cybersecurity Summit 2020 Latinoamérica
    • Webinar: Data Discovery & Governance Solutions | May 5 | 1:00 PM EDT
    • Webinar: Data Discovery - You cannot protect what you do not know. Protect what maters | Jan. 27, 2022 | 8:00am MST
    • Webinar: Data Governance for Risk Reduction and Value Creation, Oct 10
    • Webinar: Data Privacy & Protection: The Art of Protecting Your Sensitive Data, Sept. 30
    • Webinar: Data Privacy and CIAM: Completing Your Identity Stack
    • Webinar: DevSecOps for Public Sector: A Roadmap to a Modern Software Factory | February 4, 2022 | 12pm EST
    • Webinar: Enabling Zero Trust For Cloud | October 11th | 8:30 pm IST
    • Webinar: Ensure Privacy Protection Through Your Digital Transformation, March 27
    • Webinar: Evolution of Cloud Security & Privacy Technologies - CxO Perspectives | Feb 24 2022, 8:00am MST
    • Webinar: Evolution of Cloud Security & Privacy Technologies - CxO Perspectives | February 21, 2022 | 8am MST
    • Webinar: Explore the Path to Universal Policy Management, Aug. 18
    • Webinar: Five steps to implement a universal policy strategy - July 18
    • WEBINAR: How Converged Security Centres facilitate the digital transformation of security
    • Webinar: How Micro Focus Technology and Services Help Jaguar Racing Succeed | Dec. 09, 2021 | 9:00am MST
    • Webinar: Hybrid Cloud Security: Risks & Mitigation, Oct. 1
    • Webinar: It's NOT about SECURITY. It's about RESILIENCY | March 15th | 10:00 AM
    • Webinar: Log Management & Data Analysis - Security Open Data Platform, Feb 20
    • Webinar: Managing Mobile Communications – Mobile Archiving Challenges and Solutions, May 5
    • Webinar: Managing Security in a Decentralized World, March 15
    • Webinar: Micro Focus Cyber Resilient Experience to Detect Insider Threats Oct. 6
    • Webinar: Micro Focus Government Fortify Live | Jan. 18 2pm EST | Session 12
    • Webinar: Micro Focus SecOps Innovation--A look into the future of security insights, May 15
    • Webinar: Modern Appsec for Modern Apps | Mar 01 2022, 9:00am MST
    • Webinar: Next Generation SOC: The Micro Focus Point of View, Jan 22
    • Webinar: Next-level SecOps with UEBA and MITRE ATT&CK, Sept. 25
    • Webinar: Radius Accounting authentication for any device on VPN and Wifi, July 12
    • Webinar: SecOps in 2020: Insights from the SOC
    • Webinar: SecOps in 2020: Insights from the SOC Oct. 20
    • Webinar: Securely Transitioning Workloads to the Cloud , Aug. 10
    • Webinar: Securing the Value Chain with Cyber Resilience, Feb 25
    • Webinar: SSL/TLS mechanics for system admins - Making progress with crypto-gibberish, Recording & Presentation available now!
    • Webinar: Sybase DB to PostgreSQL DB Migration Process and Best Practices - Sep 05, 2019
    • Webinar: Take a deep dive into securing identities and data, Nov 7
    • Webinar: The 2022 Higher Education Cybersecurity Survey: What we found | November 3rd | 12:00 GMT
    • Webinar: The Evolving Role of the AppSec Developer | September 20th | 9:00 AM ET
    • Webinar: The Role of Data Protection in Unified Endpoint Management Protection, Sept. 24
    • Webinar: Why the Mainframe Needs Modernized Protection and Connection, May 5
    • Webinars November - Boosting User Adoption for your Business Applications
    • Welcome to Micro Focus Realize 2021 Hong Kong, May 18
    • Welcome to Micro Focus Universe 2021!
    • Welcome to the 2019 Data Breach Hall of Shame
    • Western Canada Information Security Conference Speaking Session, May 28
    • Western Canada Information Security Conference, Winnipeg, May 27-28
    • What are the major barriers to addressing climate change in the tech industry?
    • What Does the Future Hold for Robotic Surgery?
    • What Happened in CBP Data Breach and Contractor Cybersecurity Future
    • What is AI for Security Operations?
    • What is an Insider Threat? Definition, Types, & Examples
    • What is Cyber Resilience?
    • What is DevSecOps?
    • What Is File Analysis?
    • What is IFSEC’s Converged Security Centre all about? - IFSEC Global
    • What Is Single Sign-On, and How Can It Make Your Enterprise More Secure?
    • What Is the Real Cost of a Data Breach? New Report Indicates It's About $4 Million to $9 Million
    • What Is Trusted Internet Connection (TIC) 3.0?
    • What it’s going to take to fix the security debt crisis
    • What you need to know about 'bring your own key' in the cloud
    • What your data security team needs to know about the CCPA
    • What’s in store for online privacy and data management?
    • When Business Applications Take the Spotlight, So Must DevSecOps
    • When it comes to Digital Transformation, Don’t Forget Security
    • Where are you on the DevSecOps Maturity Model continuum?
    • Which Type of Chatbot Is Right for Your Business?
    • White House ramps up efforts to expand cyber workforce
    • White House Weighs New Cybersecurity Approach After Failure to Detect Hacks
    • White Paper: Adaptive Environments and Zero Trust
    • White Paper: Archiving as a Key Element of Good Information Governance
    • White Paper: Customer Satisfaction Guide for Zero Trust
    • White Paper: Insight and Control - Putting Data Privacy and Protection at the Center
    • White Paper: Strengthen Your Cyber Resilience
    • Whitepaper: 2 Steps to Close the Gap in Ransomware Defense
    • Why automating your security testing is mission-critical
    • Why businesses need to focus on cybersecurity
    • Why businesses within the Middle East need to guard against a “new normal” wave of cyberattacks
    • Why Companies Are Forming Cybersecurity Alliances
    • Why cybersecurity challenges have become a primary driver for lifecycle management
    • Why data-centric security is essential for legacy COBOL systems
    • Why Everyday Should be Data Privacy Day
    • Why getting security tool sprawl under control is essential
    • Why it matters: Security and Privacy are converging
    • Why marketing security to your org matters—and how to do it right
    • Why organisations are playing catch-up with security and ethics | IDM Magazine
    • Why privacy protection must start with application-layer encryption
    • Why secure data analytics is critical for CCPA compliance
    • Why security and IT Ops need to learn to share
    • Why this cybersecurity Executive Order is no different than the last EOs
    • Why true cyber resilience takes a measured approach
    • Why Unlike Functional Testing, Security Never Ends
    • Why Upgrade Your Software? Four reasons why.
    • Why you need to get used to SolarWinds
    • Why you should shift your cloud security strategy up stack
    • Why your approach to security architecture needs to change
    • Wie erreicht man die bestmögliche Cyber-Resilienz für sein Unternehmen? (article in German)
    • Winners of #SS19Hack announced
    • Winning business: CISOs chime in on the cyber vendor 'dating game
    • Winning the Red Queen Race - Crypto Corner
    • With compliance on the mind, corporate boards up cyber investments
    • With containers, shift your security approach to the micro-perimeters
    • Women in Cyber-Making a difference Awards and Conclave, May 13
    • Women in Security: Women to Watch | SC Media
    • Women in Tech Choose to Challenge and Refuse to Be Silenced during Women’s History Month
    • Women need to talk about their achievements in a louder voice: Satyavathi Divadari, Head of Enterprise Security Architecture, Micro Focus
    • You cannot hack yourself secure
    • You need security champions: 6 steps to get with the program
    • You Shall Not Pass: Silos Must Be Broken Down For Successful Digital Transformation
    • Your business hit by a data breach? Expect a bill of $3.92 million
    • Your Employees Are Your Best Defense Against Cyberattacks
    • Your invitation to Micro Focus Universe 2019!
    • ZENworks 2020 Community Webinars
    • ZENworks Patch Management Feature Overview - YouTube Video
    • Zero trust and cybersecurity: Here's what it means and why it matters
    • Zero trust and remote work: Identity and access management is key
    • Zero Trust security model helps SMEs digitalise with peace of mind
    • Zero Trust: Beyond access controls - Help Net Security
    • Zero-trust in a cloud-native world: Best practices emerge
    • Zerologon bug is a perfect 10. Patch now or crash hard
    • [Facebook Live Premiere] CDM in Government 2020-2021 - Progress and Best Practices
    • [VIRTUAL EVENT] DISA/Joint Service Provider (JSP) Cybersecurity Forum at the Pentagon, July 30
    • [webinar] 5 Things Every SecOps Team Wants Their NetOps Team to Know, Feb 20
    • [webinar] Avoid Sec Oooops! Your Guide to Adopting SecOps, Sept. 26th
    • ¿Cuáles han sido los ataques de interrupción de negocios más frecuentes en los últimos 12 meses?
    • ¿Por qué integrar la seguridad en DevOps? (in Spanish)
    • На «Ленфильме» прошли съемки онлайн-конференции GIS DAYS 2020
    • ‘Better’ data privacy and compliance can be found at RSA
    • “Ataques cibernéticos como el que sufrió Essilor se dan cada día en empresas de todo el mundo”
    • “Cyberattacken bieten auch eine Chance.”
    • 台灣為亞洲地區DevSecOps整合的領頭羊並關注敏捷度和效率。「新北新聞網 (article in Chinese)

    Security in DevOps Like a Boss with Tanya Janca

    Revision Creation Date Revision Author
    Current Revision 2021-4-25 2:58 PM COEST
    Revision #1 2021-4-20 4:15 PM COEST
    • Compare Versions View current version

    Resources

    Support
    Documentation
    Training
    CyberRes Academy
    Partner Portal
    Contact us
    Compliance
    Help
    Company
    Privacy Policy
    Terms of Use
    Accessibility
    Anti-Slavery Statement
    Support
    How To Buy
    Careers
    Investor Relations
    Follow Us
    Copyright © 2023 Open Text Corporation. All rights reserved.
    The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.