Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

5 steps to implement a universal policy strategy: Managing authorization and authentication policies in so many different places is highly inefficient and the lack of consistency opens your organization up to a great amount of risk. Register now for this webinar on July 18

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Six Personas for and Effective Cyber Data Science Team.jpgInterset CTO Stephan Jou’s experience at a hackathon illustrates how the most potent data science in cybersecurity comes from an intriguing array of skill sets.


Read Blog Article

Read more
1 0 9
Security_Guest Frequent Contributor.
Frequent Contributor.

big-data-security-analytics.jpgCybersecurity has been an inherently reactive discipline. That’s because it hasn’t always been possible to predict the nature of future threats. Big data security analytics has the potential to change that.


Read Blog Article

Read more
1 0 410
Micro Focus Contributor
Micro Focus Contributor

CBC Cybersecurity news.pngCBC News’ “On the Money” features Interset as Canada decides on federal budget allocation for cyber defense.


Read Blog Article

Read more
1 0 43
Security_Guest Frequent Contributor.
Frequent Contributor.

Connecting the Dots of the Uber Hack.jpgEven a seemingly simple cyberattack unfolds through many steps. With the right technology, security teams can now spot the warning signs.


Read Blog Article

Read more
0 0 55
Security_Guest Frequent Contributor.
Frequent Contributor.

The Complicated Ethics of Data-Breach Disclosure.jpgWhat’s more gut-wrenching than the moment you discover your company’s network has been breached? Having to publicly announce that breach.


Read Blog Article

Read more
1 0 58
Micro Focus Contributor
Micro Focus Contributor

Can a universal policy strategy solve all your security headaches.pngBad actors are just waiting to find vulnerabilities when it comes to security policy and will exploit any gaps every chance they get. See what universal policy management can bring to your organization in our upcoming webinar, and learn how to transform the way you manage security policies.


Read Blog Article

Read more
0 0 384
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.