Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Security_Guest Frequent Contributor.
Frequent Contributor.

For the Data Security team at Micro Focus, we see scalability of Big Data protection as a key obstacle for 2018. That's why we are looking forward to meeting our customers to discuss their challenging data protection problems at the RSA Security Conference.Scalable Data Protection.jpg

 

 


Read Blog Article

Read more
0 0 1,551
Security_Guest Frequent Contributor.
Frequent Contributor.

In this new customer case study, National Clearing Company of Pakistan Limited is now able to monitor data at a more comprehensive level, a level that was just not possible prior to ArcSight.Adopting ArcSight.png

 

 

 


Read Blog Article

Read more
0 0 1,178
Security_Guest Frequent Contributor.
Frequent Contributor.

The Micro Focus Security team is helping ensure that your Enterprise Secure Key Manager (ESKM) appliances stay up to date and trusted. Check out the new and updated features of ESKM 5.0.6 with software v7.0.6.ESKM.png

 

 


Read Blog Article

Read more
0 0 2,255
Micro Focus Expert
Micro Focus Expert

Data Privacy Day on Jan 28 creates awareness about the importance of privacy and protecting personal information. Micro Focus Security urges businesses to protect sensitive information and keep private data private.Data Privacy Day Twitter.png

 

 


Read Blog Article

Read more
1 0 897
Micro Focus Expert
Micro Focus Expert

 

If you are coming to the RSA Security Conference in April, stop by the Micro Focus Security booth to discover how we “Secure the New” and are “Stronger Together,” and learn first-hand about our integrated and complimentary security products.RSA3 Reg.png

 

 


Read Blog Article

Read more
0 0 1,833
Security_Guest Frequent Contributor.
Frequent Contributor.

With the recent upgrade release of the payment industry’s de facto standard Atalla HSM AT1000, it’s now become easier to underpin SecureData with hardware-based protection of its cryptographic secrets. Stronger Together.jpg

 

 


Read Blog Article

Read more
0 0 993
ronnytey Frequent Contributor.
Frequent Contributor.

Application security testing must adapt to existing development processes and tools, not the other way around.  It is the one thing that matters most in successfully implementing application security in your software development organization. 
Securing DevOps.png

 

 

 


Read Blog Article

Read more
0 0 1,034
Security_Guest Frequent Contributor.
Frequent Contributor.

While there is no zero-risk, silver-bullet solution to vulnerabilities such as Spectre/Meltdown, it makes sense to have confidence in hardware-based security, integrated appliances, and HSMs.Meltdown Spectre.png

 

 


Read Blog Article

Read more
1 0 1,337
Security_Guest Frequent Contributor.
Frequent Contributor.

At the center of an intelligent SOC is the ability to efficiently extract intelligence from your data to remediate IT threats. Distributed correlation is a powerful new way to scale out your SIEM's analytics and event correlation engine in a cost effective way.Scaling Out.PNG

 

 


Read Blog Article

Read more
2 0 2,505
Security_Guest Frequent Contributor.
Frequent Contributor.

Spending a lot of time and effort worrying about how hackers will be able to crack your encryption using quantum computers will distract from addressing the many very real security problems that businesses face today.Quantum.png

 


Read Blog Article

Read more
0 0 533
ronnytey Frequent Contributor.
Frequent Contributor.

Fortify is in the business of finding and helping you fix security vulnerabilities regardless of which popular programming language your developers choose to use. Language.jpg

 

 

 


Read Blog Article

Read more
0 0 781
Community Manager winkra Community Manager
Community Manager

Experience the power of Micro Focus ArcSight Investigate 2.0. Attend a virtual hands-on workshop from the convenience of your desk.  


Read Blog Article

Read more
0 0 998
RONL_MCRO Contributor.
Contributor.

Yoga pants could be a way to smuggle out information in plain sight. But what about cyber attackers in plain sight, such as employees? See how Micro Focus Security solutions could help prevent cyber theft at your enterprise.YogaPants.jpg

 

 


Read Blog Article

Read more
1 0 771
Micro Focus Expert
Micro Focus Expert

The bring your own device (BYOD) debate has suddenly become a top issue again, following the recent White House decision to ban personal devices from the West Wing.

white-house-450x300.jpg

 


Read Blog Article

Read more
0 0 2,859
Security_Guest Frequent Contributor.
Frequent Contributor.

The new Micro Focus security portfolio is the versatile multi-trick llama of enterprise IT protection—and the combined value we create for our customers as the world’s 7th largest software company.llama.jpg

 

 

 


Read Blog Article

Read more
0 0 662
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.