Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Expert
Micro Focus Expert

John Delk.jpgWith our 2019 Micro Focus Cybersecurity Summit set for June of this year, get the highlights of the 2018 Summit, which introduced our expanded security portfolio. Then make plans to attend this year!


Read Blog Article

Read more
0 0 1,757
Micro Focus Expert
Micro Focus Expert

Implementing Data Security Throughout the Enterprise.pngFinally, we are now ready to roll data protection out throughout the enterprise. Let’s take a process-driven approach and identify our inputs, activities, outputs, entry, and exit criteria, says Jason Kazarian in his latest blog on implementing a data security practice.


Read Blog Article

Read more
2 0 1,591
Micro Focus Expert
Micro Focus Expert

The Good and the Bad in the Global State of Cybersecurity.pngThe new Cyberthreat Defense Report surveyed IT security decision makers and asked them to share how they plan to improve their security posture and which technologies they see as essential weapons against cyberthreats. The survey also looked at the biggest headaches and obstacles for IT security professionals.


Read Blog Article

Read more
1 0 3,014
Micro Focus Expert
Micro Focus Expert

AppSec comes alive with the Fortify Unplugged video series.pngFortify has an Unplugged video series on YouTube that shows some of our most useful features or common questions. Our approach is to have some quick demos—not marketing fluff—that really help a prospect or customer understand how Fortify delivers seamless application security.


Read Blog Article

Read more
2 1 1,948
Micro Focus Expert
Micro Focus Expert

Ransomware Preventing Hostage Data.jpgRansomware is one of the most pressing threats of our time, causing billions of dollars in lost time and productivity and sapping IT resources. This high cost of failure is preventable if businesses adapt and enforce these best practices.


Read Blog Article

Read more
0 0 3,228
Micro Focus Expert
Micro Focus Expert

Developing a prioritized security strategy.jpgWe’ve described the processes for implementing a data security practice; a list of critical digital assets, a threat and vulnerability assessment, and documentation of governance and regulatory requirements. Now we will use these artifacts to synthesize a prioritized security strategy.


Read Blog Article

Read more
2 0 537
Micro Focus Contributor
Micro Focus Contributor

Ensure Privacy Protection.jpgDigital transformation is key to business success but is also a major vulnerability when it comes to data privacy. Learn about the approaches, methodologies, and technology that can help you face privacy challenges during your digital transformation.


Read Blog Article

Read more
1 0 1,728
Micro Focus Expert
Micro Focus Expert

Privacy and Data Protection.jpgThere is a lot more data at risk today than there has been in the past. The explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it.


Read Blog Article

Read more
1 0 1,431
Micro Focus Expert
Micro Focus Expert

Addressing Governance and Regulatory requirements.pngNow it’s time to delve into the third process in a data security practice, which is assessing data governance and regulatory requirements.


Read Blog Article

Read more
2 0 5,230
Micro Focus Expert
Micro Focus Expert

Kuppingercole Takes notice of Micro Focus Access Manager.pngKuppingCole’s Leadership Compass for Access Management and Federation report provides an overview and analysis of both traditional Web Access Management and Identity Federation. Micro Focus Access Manager does well in this review because the report does a good job vetting out all the different ways that organizations use the gateway.


Read Blog Article

Read more
1 0 1,049
Micro Focus Expert
Micro Focus Expert

Evaluating threats against and vulnerabilities of critical assets.pngIn the last post in my series on Data Security, we defined a process for identifying critical assets and intellectual property that are worth protecting. Now it’s time to discuss the second process, namely evaluating threats against and vulnerabilities of these identified critical assets.


Read Blog Article

Read more
1 0 1,079
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.