Welcome Serena Central users! CLICK HERE
The migration of the Serena Central community is currently underway. Be sure to read THIS MESSAGE to get your new login set up to access your account.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Join the Micro Focus IAM Team at the Gartner Identity and Access Management Summit 2019 on Dec 10-12 in Las Vegas. Use our discount code IAMSP7 to receive $350 off at registration

Security Blog

stephanjou Contributor.
Contributor.

Cybersecurity Data Science.jpgWhether you’re building a threat detection system using data science or evaluating a security vendor, this blog can serve as a guide to understanding how you can identify unusual behaviors in your enterprise with data science.


Read Blog Article

Read more
2 0 1,214
pwheiler Respected Contributor.
Respected Contributor.

Leveraging MITRE ATT&CK for Security Operations.pngThe MITRE ATT&CK Framework provides security teams (detection teams, response teams, hunt teams, etc.) with a common language that they can collectively use when discussing their cyber threat defensive strategies and then mapping out their existing solutions and defensive capabilities to the matrices provided by MITRE. Micro Focus’ Emrah Alpa recommends that organizations start by first identifying the top techniques used by their most likely threat actors.


Read Blog Article

Read more
6 0 1,785
Gretha Loubser Trusted Contributor.
Trusted Contributor.

Machine Learning in the SOC—Part 3.pngMachine learning has the power to transform your security operations, but as with any powerful technology, it needs to be approached strategically. Interset has first-hand experience with helping organizations across the world implement and operationalize machine learning in their SOCs, and has identified four best practices that are critical for achieving success.


Read Blog Article

Read more
1 0 1,898
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Myths in your SOCs.pngThere is a myth that rule-based Security Information and Event Management (SIEM) is old technology, and is no longer worth using today. If companies believe it, they are giving up valuable protection that can be the difference between a massive data breach or simply another day in security operations.


Read Blog Article

Read more
3 0 2,365
Micro Focus Expert
Micro Focus Expert

Improved functionality and features with newest Fortify on Demand release.jpgIn the new release of Fortify on Demand (FoD) 19.5, which delivers application security as a service, users will experience some exciting new functionality. Here are four highlights:


Read Blog Article

Read more
2 0 2,694
Gretha Loubser Trusted Contributor.
Trusted Contributor.

Machine Learning in the SOC—Part 2.pngIf everyone is using AI, how do I decide which solution to use? The answer is two-fold: First, recognize that not all machine learning is created equal, and second, make sure you understand your use cases. 


Read Blog Article

Read more
2 0 1,533
Security Blog Welcome to the Security Blog!
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.