Our vBulletin migration is complete.
Welcome vBulletin users! All content and user information from the Micro Focus Forums (vBulletin) site has been migrated to this site. READ MORE.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Machine learning in cybersecurity: One size doesn't fit all. Learn about two main categories of machine learning—supervised and unsupervised—and how they can be applied practically in the context of solving cybersecurity problems.

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Why enforce the principle of least privilege in your AD environment.pngThe principle of least privilege is one of the most critical concepts to address as you construct a breach defense strategy. It is a best practice to implement the principle of least privilege across your entire environment, including in your Active Directory (AD) environment.


Read Blog Article

Read more
1 0 211
Security_Guest Frequent Contributor.
Frequent Contributor.

DevSecOps – the perfect marriage between DevOps and Security.pngThe Micro Focus team was excited to jointly organise with Singapore Press Holdings (SPH), Singapore’s media organisation, a mini hackathon and discuss the importance of DevSecOps – the perfect marriage between DevOps and Security.


Read Blog Article

Read more
2 0 714
Micro Focus Expert
Micro Focus Expert

WebInspect has 3 great new features .pngThe new WebInspect release (Version 19.1.0) delivers automation capabilities, integrates our dynamic technology as part of an organization’s ecosystem, and improves the user experience.


Read Blog Article

Read more
2 0 661
Micro Focus Expert
Micro Focus Expert

Choosing a Database Protection Technology.pngHow best to protect a database? There are multiple types of database protection technology with varying “ease of use” levels. Choosing the optimum type depends on how isolated a particular database server is from the enterprise data network. And an organization’s compliance and governance policies.


Read Blog Article

Read more
0 0 715
Micro Focus Contributor
Micro Focus Contributor

Three considerations for monitoring changes to Azure Active Directory.pngChange monitoring has been established as vital to security and compliance for enterprises using Active Directory. However, some IT administrators feel that, since they have implemented Azure AD, they don’t need to worry about the Azure component being monitored. Here are the most three considerations.


Read Blog Article

Read more
2 0 791
Micro Focus Expert
Micro Focus Expert

Optimizing and Maturing an AppSec Program.pngAppSec is a never-ending journey and engagement. To reach true maturity, organizations really must embrace AppSec as part of its cultural fiber.


Read Blog Article

Read more
1 0 1,196
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.