Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

wheaps Absent Member.
Absent Member.


IoT

Get ready for the Internet of (Every)thing!  As IT professionals, if we aren’t preparing for it now—we’re falling behind. But what exactly will the Internet of Things (IoT) mean for our IT environments going forward? How are we going to deliver on all this hype and buzz?


Read Blog Article

Read more
0 0 3,391
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

An application may be using some proprietary frameworks or internally developed 'common' modules. Usually such common modules are built separately, and are included as binary dependencies when building the main application. This means that the source code for such common modules is not available while building or scanning the main application.


Read Blog Article

Read more
6 2 4,410
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.