Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

RONL_MCRO Contributor.
Contributor.

Did your organization miss the GDPR deadline? See how you can “re-calculate” when it comes to data privacy and protection and then proceed safely and efficiently on your way. You Missed the GDPR Turn.jpg

 


Read Blog Article

Read more
0 0 2,141
Security_Guest Frequent Contributor.
Frequent Contributor.

The amount of information SIEMs need to analyze to detect threats is growing bigger and bigger. Making scalable real-time distributed event correlation a key part of your security strategy is the answer to speeding up threat detection and response.Mean Time to Detection .png

 


Read Blog Article

Read more
0 0 2,093
Jamie Manuel Frequent Contributor.
Frequent Contributor.

Micro Focus is reinforcing its commitment of making Identity Governance more efficient at managing risk and eliminating “checkbox” approvals with our new SaaS delivery option.eliminate checkbox approval.png

 

 

 


Read Blog Article

Read more
1 0 1,586
Micro Focus Expert
Micro Focus Expert

Micro Focus’s Advanced Authentication (AA) is an open framework that allows just about any authentication type to be plugged into it. With its open architecture, AA allows organizations to future proof their environment so they can always have the freedom to adopt the latest without the fear of vendor lock-in.

Screenshot-2018-5-21-5-Creative-Uses-of-Advanced-Authentication-500x263.png

 


Read Blog Article

Read more
1 0 1,397
Micro Focus Expert
Micro Focus Expert

Registration is open for Open Horizons Summit in EMEA June 4-7. The Security tracks will focus on the Micro Focus Security Portfolio of security operations, application security, identity and access management, endpoint management, and data security.Open Horizons Blog.png


Read Blog Article

Read more
0 0 1,521
Micro Focus Expert
Micro Focus Expert

zen.pngWhether your IT team is managing a BYOD environment or corporate-owned devices – or a combination of both– you can simply manage them from a single #endpoint management solution. 


Read Blog Article

Read more
0 0 2,433
Mdelima Valued Contributor.
Valued Contributor.

When encryption is used to protect data at-rest, strong and secure key management is needed. See what’s new in Micro Focus Enterprise Secure Key Manager 5.0.8 release and why you should upgrade.

Keys to Kingdom.jpg

 


Read Blog Article

Read more
0 0 1,096
Security_Guest Frequent Contributor.
Frequent Contributor.

It’s disturbing to find that people think popular media is more accurate than experts when it comes to encryption. Don’t worry, the current Advanced Encryption Standard (AES) is not “crackable” in any realistic way.

Fake Encryption.png

 


Read Blog Article

Read more
0 0 1,109
Micro Focus Expert
Micro Focus Expert

Developers can get immediate visibility about their vulnerabilities as they write code and help prevent costly security mistakes with Micro Focus Fortify Security Assistant for Visual Studio 2017..Real-time security .jpg

 

 

 


Read Blog Article

Read more
0 0 2,250
Micro Focus Expert
Micro Focus Expert

IT departments have their hands full with a constant stream of upgrades and patches, security threats, and onboarding requests. Now the Micro Focus partner community and customers can join us at the Open Horizons Summit in Berlin, June 4-7. Among the products featured at the Summit will be Zenworks Unified Endpoint Management that protects, monitors and maintains the health of #endpoint devices.


Read Blog Article

Read more
0 0 1,905
Security_Guest Frequent Contributor.
Frequent Contributor.

As damaging as ransomware attacks are, now attackers are turning to cryptojacking, where they silently enslave computers and use their power to produce coin, unbeknownst to the system owners.Ransomware and Cryptojacking.PNG


Read Blog Article

Read more
0 0 1,687
Micro Focus Expert
Micro Focus Expert

Organizations struggle to make authentication strong without also creating an experience that is too cumbersome for users. The IAM team shares the transformations they are seeing in authentication among customers.5 Creative Uses of Advanced Authentication1.png

 

 

 

 


Read Blog Article

Read more
1 0 2,292
Security_Guest Frequent Contributor.
Frequent Contributor.

Big Data can be used to detect threats if you can bring in enough of that data to an analytics platform. The problem is that most SIEM vendors charge by data ingestion, so the more data you bring in, the more you pay. What if that could be changed?All you can eat.png

 

 


Read Blog Article

Read more
0 0 1,814
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Data protection starts with a first step, no matter where you are in your journey. Whether solving for GDPR compliance or simply having a data privacy policy that requires a fast, effective approach to managing risk, we have you covered.I’m not here to give you GDPR advice1.png

 

 


Read Blog Article

Read more
1 0 2,195
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.