Our vBulletin migration is complete.
Welcome vBulletin users! All content and user information from the Micro Focus Forums (vBulletin) site has been migrated to this site. READ MORE.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Security_Guest Frequent Contributor.
Frequent Contributor.

Recent new feature releases add to the Fortify application security portfolio to continue to enable DevOps with increased coverage for development, faster scans and easier auditing. 
17.2_Release.jpg

 

 


Read Blog Article

Read more
0 0 1,360
Security_Guest Frequent Contributor.
Frequent Contributor.

The US CERT released updated indicators of compromise (IOCs) for HIDDEN COBRA. The Micro Focus Activate security content team has created a solution for this threat. Hidden Cobra.jpg

 


Read Blog Article

Read more
0 0 682
Security_Guest Frequent Contributor.
Frequent Contributor.

With the integration of Fortify on Demand (FoD) and Secure Code Warrior, any security vulnerabilities identified by FoD will now offer a direct link to a practical training module that teaches the developer why the problem happened, how to fix it, and, more importantly, how to prevent making the same mistake again.

SecureCode Warrior.jpg

 

 

 


Read Blog Article

Read more
0 0 788
Micro Focus Expert
Micro Focus Expert

As we prepare to turn the corner into 2018, there is one challenge that should be on every business leader’s mind and that is ransomware — that is, a dangerous type of malware that can hijack files and hold them until payment is received.Ransomware-450x214.jpg

 


Read Blog Article

Read more
0 0 2,305
Micro Focus Expert
Micro Focus Expert

Orgs need to guard against cyber security accidents, such as a USB drive getting lost or stolen, or a deliberate act of ill intent to cause a massive data breach. USB.png


Read Blog Article

Read more
0 0 1,773
Security_Guest Frequent Contributor.
Frequent Contributor.

For enterprises, there is an ROI calculation to prove the value of application security in advance of a breach of their web apps and can help justify the investment in a robust application security program. Continuous Delivery of Business Value with Fortify.PNG

 

 

 


Read Blog Article

Read more
0 0 755
Security_Guest Frequent Contributor.
Frequent Contributor.

No matter how hard you educate your employees to not click on phishing or fake emails, there’s always a few that just can’t seem to stop themselves. The real question is, what to do?

Internet Security Threat Report.png


Read Blog Article

Read more
0 0 860
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.