Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Expert
Micro Focus Expert

WebInspect has 3 great new features .pngThe new WebInspect release (Version 19.1.0) delivers automation capabilities, integrates our dynamic technology as part of an organization’s ecosystem, and improves the user experience.


Read Blog Article

Read more
0 0 15
Micro Focus Expert
Micro Focus Expert

Choosing a Database Protection Technology.pngHow best to protect a database? There are multiple types of database protection technology with varying “ease of use” levels. Choosing the optimum type depends on how isolated a particular database server is from the enterprise data network. And an organization’s compliance and governance policies.


Read Blog Article

Read more
0 0 217
Micro Focus Contributor
Micro Focus Contributor

Three considerations for monitoring changes to Azure Active Directory.pngChange monitoring has been established as vital to security and compliance for enterprises using Active Directory. However, some IT administrators feel that, since they have implemented Azure AD, they don’t need to worry about the Azure component being monitored. Here are the most three considerations.


Read Blog Article

Read more
2 0 366
Micro Focus Expert
Micro Focus Expert

Optimizing and Maturing an AppSec Program.pngAppSec is a never-ending journey and engagement. To reach true maturity, organizations really must embrace AppSec as part of its cultural fiber.


Read Blog Article

Read more
1 0 732
Security_Guest Frequent Contributor.
Frequent Contributor.

SIM SEM and SIEM Definitions and Choosing the Right Enterprise Solution.pngTo have a firm grasp of the SIEM definition, it’s important to first understand its two main components—security information management (SIM) and security event management (SEM). SIEM, SIM and SEM are erroneously used interchangeably when in fact they refer to different types of security systems.


Read Blog Article

Read more
0 0 779
Micro Focus Contributor
Micro Focus Contributor

It is with great pleasure that I announce my new role as Sr. Product Manager - ArcSight Global Content & Connectors. This is a dream opportunity to bring industry's best SIEM portfolio back into the epicenter of Intelligent SOC's.

With my new role, I will be presenting 2 topics @ Cybersecurity Summit 2019 this week, in wonderful Dallas, TX.


Read Blog Article

Read more
1 0 94
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.