Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Security_Guest Frequent Contributor.
Frequent Contributor.

Are these new identity innovations truly more secure or just make weaknesses into moving targets? Either way, it’s good seeing the industry at least make an effort to improve security. fingerprint.jpg

 

 

 


Read Blog Article

Read more
0 0 563
Security_Guest Frequent Contributor.
Frequent Contributor.

There is a list of common objections to Format-Preserving Encryption, all of which we’ve already considered and developed ways to handle, says Luther Martin, Micro Focus Distinguished Technologist.I_Object.jpg

 

 

 


Read Blog Article

Read more
0 0 434
Micro Focus Expert
Micro Focus Expert

Last year was devastating as far as cybercrime is concerned, especially from a financial perspective, so it’s time to identify your blind spots and fortify your defenses. Micro Focus offers a variety of solutions to protect your company’s digital assets.

Cyber-450x301.jpg

 

 

 


Read Blog Article

Read more
0 0 1,483
Security_Guest Frequent Contributor.
Frequent Contributor.

Get a walkthrough of a SQL injection attack and see how Fortify Application Defender can protect you from these types of attacks.True application protection.png

 


Read Blog Article

Read more
0 0 654
ronnytey Frequent Contributor.
Frequent Contributor.

How do we get developers involved in security testing without impeding their ability to submit code on time? Here are 3 easy steps.3 Steps.jpg

 


Read Blog Article

Read more
0 0 880
RONL_MCRO Contributor.
Contributor.

Discover how the New Micro Focus benefits the security of your critical information.

TheNewMicroFocus.jpg

 

 

 

 

 

 

 

 


Read Blog Article

Read more
0 0 995
Security_Guest Frequent Contributor.
Frequent Contributor.

Vulnerabilities like DUHK are unfortunate, but equally unfortunate is the willingness of some vendors to cut corners when it comes to their implementation of cryptography.DUHK.png

 

 


Read Blog Article

Read more
0 0 428
Security_Guest Frequent Contributor.
Frequent Contributor.

A typical security team is only aware of the risks associated with the network and infrastructure layers, leaving a gap in the protective controls at the application and data layers. The ideal method to reduce application security risks would be to bake in application security to your DevOps processes.

Your App Sec team can finally sleep soundly at night.jpg

 

 

 

 

 


Read Blog Article

Read more
2 0 920
Security_Guest Frequent Contributor.
Frequent Contributor.

As the IT landscape continues to evolve, so too must our security solutions to keep pace with attackers. Here are five reasons why ArcSight continues to be mission critical and relevant in the most advanced cyber defense centers in the world. 

Why ArcSight Remains.jpg


Read Blog Article

Read more
1 0 2,514
JasonSchmitt Absent Member.
Absent Member.

The SIEM is just one tool in the arsenal of modern Security Operations, where the sophistication, frequency and danger of threats has greatly exceeded what first-generation SIEM technologies of yesterday could handle. ArcSight has been leading the Security Operations market for more than 15 years, since before the advent of the SIEM term, and continues to thrive in the world’s largest, most hostile security environments.

Jason Blog.jpg

 

 


Read Blog Article

Read more
2 1 2,044
Security_Guest Frequent Contributor.
Frequent Contributor.

With all of the buzz around the security and privacy of big data environments, organizations can focus on four main technology pillars to address the challenges presented with big data.
BigDataSecurity.png

 

 


Read Blog Article

Read more
2 0 770
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.