Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Unified Endpoint Management with the Latest Release of ZENworks 2017.jpgAs an organization grows, the often-fragmented endpoint management that worked in a smaller company starts to present a significant risk. See how the power of Unified Endpoint Management can give you streamlined enterprise IT management.


Read Blog Article

Read more
0 0 126
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

The Most Pressing Issues Regarding Application Security.pngA survey by BizTechInsights reveals the most common factors that impact organizations’ implementation and use of application security solutions, what they consider to be the most pressing issues regarding their application security solution, and more.


Read Blog Article

Read more
1 0 1,469
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

In this on-going Data Security blog series on implementing a data security practice, we now answer a fundamental question: what is the business value of protecting data? How does a data security practice benefit a business financially?The Business Value of Protecting Data.png


Read Blog Article

Read more
0 0 1,554
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Learn about the new features and enhancements in Micro Focus ZENworks 2017 Update 4.ZENworks.png


Read Blog Article

Read more
0 0 146
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Are you actively scanning for vulnerabilities and utilizing data to track down both known and unknown threats? Are you managing and monitoring the identities and behaviors of your users? And when a breach does occur, does your data remain secure and encrypted?Effective Breach Defense Through Cyber Security Frameworks.jpg


Read Blog Article

Read more
0 0 1,329
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

We celebrate Data Privacy Day on Jan 28 every year. Rather than reflecting on all the bad stuff that can happen when companies have their data stolen, let’s instead look forward to a day when data is secure and can then be used to bring new value to orgs.

Happy Data Privacy Day.png


Read Blog Article

Read more
2 1 2,756
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

In the latest version of OWASP Top 10 released in 2017, some types of vulnerabilities which no longer represent a serious threat were replaced with ones most likely to pose a significant risk. See what has changed since the last version of the Top 10 in 2013.A Developers Guide to the OWASP Top 10.png

 


Read Blog Article

Read more
1 0 1,497
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Data security is defined as protecting data by storing meaningless substitutes for the original value, be it via encryption or tokenization technology. Yet by applying decryption or detokenization to these substitutes, we can regenerate the original value.What is a Data Security Practice.png 


Read Blog Article

Read more
0 0 1,608
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Data Privacy Day on Jan 28 creates awareness about the importance of privacy and protecting personal information. Micro Focus Security urges businesses to manage and protect sensitive information and keep private data private.Jan28_is_DPD_5.png 


Read Blog Article

Read more
0 0 3,995
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

This new blog series will be an informal handbook for building and managing a data security practice. This post is the introduction to a series delving into questions received from customers and partners centered around the data security practice.Building and managing a data security practice.png 


Read Blog Article

Read more
0 0 1,820
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

How can Healthcare entities protect themselves and their data yet still use it? One way for those in the Healthcare Industry to educate themselves on information security best practices and big data analytics solutions is to attend the HIMSS Global Conference.See how to protect and optimize your healthcare data at HIMSS 2019.jpg 


Read Blog Article

Read more
0 0 2,154
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Ensuring your applications are secure doesn’t have to be a cumbersome process. With the right program and tools, you can improve or start your organization’s security initiative without getting in the way of developers’ productivity. See how:Get Started with Seamless AppSec in One Day.png 


Read Blog Article

Read more
1 0 1,269
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Has your access management caught up to your services?Access Management for Microservices.PNG

 


Read Blog Article

Read more
0 0 1,493
Micro Focus Contributor
Micro Focus Contributor

Last year saw large data breaches continue with an apparent lack of urgency to remediate these problems. In some ways, it feels similar to global scientific efforts to bring renewed attention to climate change and taking action to address it before it is too late.Data Protection and Global Warming.jpg 


Read Blog Article

Read more
1 0 1,458
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Phone scammers and robocallers use Spoofed CallerID information to fool us into answering their calls. The FCC wants to adopt a technology to eliminate forged Caller ID, using digital certificates similar to how we validate that websites are not spoofed.RoboHope to Rid us of Phone Scammers.jpg 


Read Blog Article

Read more
0 0 1,481
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.