Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Developing a prioritized security strategy.jpgWe’ve described the processes for implementing a data security practice; a list of critical digital assets, a threat and vulnerability assessment, and documentation of governance and regulatory requirements. Now we will use these artifacts to synthesize a prioritized security strategy.


Read Blog Article

Read more
1 0 95
Micro Focus Contributor
Micro Focus Contributor

Ensure Privacy Protection.jpgDigital transformation is key to business success but is also a major vulnerability when it comes to data privacy. Learn about the approaches, methodologies, and technology that can help you face privacy challenges during your digital transformation.


Read Blog Article

Read more
1 0 693
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Privacy and Data Protection.jpgThere is a lot more data at risk today than there has been in the past. The explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it.


Read Blog Article

Read more
1 0 549
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Addressing Governance and Regulatory requirements.pngNow it’s time to delve into the third process in a data security practice, which is assessing data governance and regulatory requirements.


Read Blog Article

Read more
1 0 4,706
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Kuppingercole Takes notice of Micro Focus Access Manager.pngKuppingCole’s Leadership Compass for Access Management and Federation report provides an overview and analysis of both traditional Web Access Management and Identity Federation. Micro Focus Access Manager does well in this review because the report does a good job vetting out all the different ways that organizations use the gateway.


Read Blog Article

Read more
1 0 656
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Evaluating threats against and vulnerabilities of critical assets.pngIn the last post in my series on Data Security, we defined a process for identifying critical assets and intellectual property that are worth protecting. Now it’s time to discuss the second process, namely evaluating threats against and vulnerabilities of these identified critical assets.


Read Blog Article

Read more
0 0 787
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.