Welcome Serena Central users! CLICK HERE
The migration of the Serena Central community is currently underway. Be sure to read THIS MESSAGE to get your new login set up to access your account.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Join us for FutureCon 2019 Atlanta on January 15 to chat with our specialists about our Security, Risk, and Governance solutions. Register now and use the promo code MICROFOCUS to receive a free full day pass!

Security Blog

Micro Focus Expert
Micro Focus Expert

5 new Fortify on Demand features.pngFortify on Demand team is hard at work releasing new features and providing improved scanning for both dynamic and static application security testing. Recently Fortify on Demand released an update that provides five new features and integrations that our customers will be sure to love.


Read Blog Article

Read more
2 0 456
stephanjou Contributor.
Contributor.

Cybersecurity Data Science.jpgWhether you’re building a threat detection system using data science or evaluating a security vendor, this blog can serve as a guide to understanding how you can identify unusual behaviors in your enterprise with data science.


Read Blog Article

Read more
2 0 1,461
pwheiler Respected Contributor.
Respected Contributor.

Leveraging MITRE ATT&CK for Security Operations.pngThe MITRE ATT&CK Framework provides security teams (detection teams, response teams, hunt teams, etc.) with a common language that they can collectively use when discussing their cyber threat defensive strategies and then mapping out their existing solutions and defensive capabilities to the matrices provided by MITRE. Micro Focus’ Emrah Alpa recommends that organizations start by first identifying the top techniques used by their most likely threat actors.


Read Blog Article

Read more
6 0 2,213
Gretha Loubser Trusted Contributor.
Trusted Contributor.

Machine Learning in the SOC—Part 3.pngMachine learning has the power to transform your security operations, but as with any powerful technology, it needs to be approached strategically. Interset has first-hand experience with helping organizations across the world implement and operationalize machine learning in their SOCs, and has identified four best practices that are critical for achieving success.


Read Blog Article

Read more
1 0 2,131
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Myths in your SOCs.pngThere is a myth that rule-based Security Information and Event Management (SIEM) is old technology, and is no longer worth using today. If companies believe it, they are giving up valuable protection that can be the difference between a massive data breach or simply another day in security operations.


Read Blog Article

Read more
3 0 2,495
Micro Focus Expert
Micro Focus Expert

Improved functionality and features with newest Fortify on Demand release.jpgIn the new release of Fortify on Demand (FoD) 19.5, which delivers application security as a service, users will experience some exciting new functionality. Here are four highlights:


Read Blog Article

Read more
2 0 2,876
Security Blog Welcome to the Security Blog!
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.