Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Expert
Micro Focus Expert

Gartner 2019 Magic Quadrant.jpgOnce again, #Gartner has named #MicroFocus a Leader in the Magic Quadrant for Application #Security Testing for its #Fortify offering based on their completeness of vision and ability to execute.


Read Blog Article

Read more
2 0 2,745
Micro Focus Expert
Micro Focus Expert

Don’t be a Breach Statistic .pngThe second annual Micro Focus Cybersecurity Summit takes place in Dallas on June 11-13. Find out what’s in store for this year’s Cybersecurity Summit and what you can learn about our expanded security portfolio.

 


Read Blog Article

Read more
0 0 2,625
Micro Focus Expert
Micro Focus Expert

How to Balance Usability and Data Protection in the BYOD Era.pngCurrent mobile device management (MDM) solutions offer control at the expense of usability. They feel intrusive and conflict with the nature of BYOD. With ZENworks Mobile Workspace, administrators can balance usability and data protection without the frustration.


Read Blog Article

Read more
1 0 1,351
Micro Focus Expert
Micro Focus Expert

Key Takeaways from Implementing a Data Security Practice.pngNow that Jason Kazarian’s blog series on building a data security practice is complete, he takes one last post to summarize the journey with some key takeaways.


Read Blog Article

Read more
1 0 1,238
Security_Guest Frequent Contributor.
Frequent Contributor.

A Wake-Up Call for CIOs.jpgIn a rapidly expanding digital economy with no boundaries, security is an ever-evolving and time-consuming matter. It’s a complex, continuous, long-term task that can only be achieved with the right partner. The question that CIOs need to ask themselves is, “Are we doing enough?”


Read Blog Article

Read more
2 0 1,662
Micro Focus Expert
Micro Focus Expert

Improving and Monitoring a Data Security Practice.jpgJust as a car needs regularly scheduled maintenance to avoid become a repair nightmare, a data security practice needs regular improving and monitoring.


Read Blog Article

Read more
1 0 1,257
Security_Guest Frequent Contributor.
Frequent Contributor.

Micro Focus Universe Recap by the Numbers.pngThe Security Risk and Governance Forum (SRG) at Micro Focus Universe attracted over 300 customers and partners this year. Through presentations from top customers, Micro Focus experts and partners, the entire event was focused on how to protect what matters the most: identities, apps and data. Here are highlights in numbers.


Read Blog Article

Read more
1 0 1,524
Micro Focus Expert
Micro Focus Expert

Reducing Cost and Increasing Performance of Implementing Data Security .pngOrganizations can mitigate the direct and indirect costs of data security by reducing the number of times needed to run data protection IT processes. This can be done in three different ways: protect data at the application level, avoid decryption when possible, and reduce the life cycle key management cost.


Read Blog Article

Read more
2 0 1,212
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.