Community in read only mode June 18 & 19
This community will be set in READ ONLY mode for a while on Tuesday June 18 into Wednesday June 19 while we import content and users from our Micro Focus Forums community site. MORE INFORMATION
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Three considerations for monitoring changes to Azure Active Directory.pngChange monitoring has been established as vital to security and compliance for enterprises using Active Directory. However, some IT administrators feel that, since they have implemented Azure AD, they don’t need to worry about the Azure component being monitored. Here are the most three considerations.


Read Blog Article

Read more
1 0 193
Micro Focus Expert
Micro Focus Expert

Optimizing and Maturing an AppSec Program.pngAppSec is a never-ending journey and engagement. To reach true maturity, organizations really must embrace AppSec as part of its cultural fiber.


Read Blog Article

Read more
1 0 635
Security_Guest Frequent Contributor.
Frequent Contributor.

SIM SEM and SIEM Definitions and Choosing the Right Enterprise Solution.pngTo have a firm grasp of the SIEM definition, it’s important to first understand its two main components—security information management (SIM) and security event management (SEM). SIEM, SIM and SEM are erroneously used interchangeably when in fact they refer to different types of security systems.


Read Blog Article

Read more
0 0 686
Micro Focus Contributor
Micro Focus Contributor

It is with great pleasure that I announce my new role as Sr. Product Manager - ArcSight Global Content & Connectors. This is a dream opportunity to bring industry's best SIEM portfolio back into the epicenter of Intelligent SOC's.

With my new role, I will be presenting 2 topics @ Cybersecurity Summit 2019 this week, in wonderful Dallas, TX.


Read Blog Article

Read more
1 0 88
Micro Focus Expert
Micro Focus Expert

Five Ways to Integrate Security into Digital Transformation   .pngA new ebook highlighting secure digital transformation from DXC Technology and its partner Micro Focus discusses five omnipresent cybersecurity challenges and presents corresponding ways to overcome them.


Read Blog Article

Read more
0 0 1,177
Micro Focus Expert
Micro Focus Expert

Enforcing Third Normal Form in Database Design.pngIn our database security blog series, we identified six major topics, the first of which is enforcing third normal form (3NF) in database design. This is a fundamental data model necessary to guarantee relational integrity when we encrypt data items. Especially if one wants to rotate keys within a database.


Read Blog Article

Read more
0 0 382
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.