Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Cami_Lewis Respected Contributor.
Respected Contributor.

Security Information and Event Management (SIEM) tools have played a central role in enterprise IT security for more than a decade, and some believe the technology has reached its end of life.  The assertion that SIEM is dead could not be further from the truth.  There is tremendous value provided by SIEM that is often taken for granted by organizations today. SIEMUndertheHood.png

 


Read Blog Article

Read more
0 0 5,066
Security_Guest Frequent Contributor.
Frequent Contributor.

ArcSight Activate Framework allows ESM users to create and customize use cases and content for their environment. Our new Activate Configurator makes finding and creating detection use cases simple and easily functional.  ArcSight.PNG

 


Read Blog Article

Read more
0 0 765
Cami_Lewis Respected Contributor.
Respected Contributor.

At the Protect 2017 security conference, the ArcSight team announced Arcsight Investigate, as well as highlighted their SIEM offering and new open architecture, Event Broker. Learn more about ArcSight’s new Security Operations solutions by registering for Protect Online.

ArcSightRoadAhead.jpg


Read Blog Article

Read more
0 0 450
Security_Guest Frequent Contributor.
Frequent Contributor.

 

The steps to protect personally identifiable information (PII) within organizations and to be aware of the possibility of insider leaks is at the forefront of security operations (SecOps) and security operations centers (SOC) globally. As a solution to internal security concerns and threats of the release of information, enterprises have begun to employ security information and event management (SIEM) and user behavior analytics (UBA).User Behavior Analytics.jpg


Read Blog Article

Read more
0 0 373
Micro Focus Expert
Micro Focus Expert

Protecting legacy and third party applications and securing new technologies with application security requires a different approach compared to securing in-house developed code. Here’s how you can do it:Code_Untouchables.jpg

 

 


Read Blog Article

Read more
0 0 451
Micro Focus Expert
Micro Focus Expert

AppSecUSA10.PNG

 OWASP AppSec USA is the top event for application security professionals and developers who are interested in appsec. Micro Focus Fortify will be there as a platinum sponsor at booth at #P4 talking about new appsec technologies, and a secure coding tournament presented with Secure Code Warrior.

 


Read Blog Article

Read more
0 0 352
Micro Focus Expert
Micro Focus Expert

Fortifyexpandsportfolio.png

 At Protect 2017,  we announced significant automation advancements to the Fortify application security portfolio. The updated portfolio empowers developers, testers and operations teams to implement security testing and remediation faster, and delivers better performance, expansion of language support, and enhancements to APIs and integrations. 

 


Read Blog Article

Read more
0 0 728
Micro Focus Expert
Micro Focus Expert

SASTandDAST.jpgWhen static application security testing and dynamic application security testing technologies are used in combination, they provide the most accurate assessment of application risks. 


Read Blog Article

Read more
0 0 557
Micro Focus Expert
Micro Focus Expert

Ransomware-450x214.jpgHere are some specific ransomware-related challenges that Micro Focus can help you overcome:


Read Blog Article

Read more
0 0 2,861
Micro Focus Expert
Micro Focus Expert

SecurityAnnouncement.jpg

Micro Focus announced at Protect 2017 new innovations in analytics empower organizations with better threat detection and security across users, apps and data.

 


Read Blog Article

Read more
0 0 892
Security_Guest Frequent Contributor.
Frequent Contributor.

ArcSightInvestigate.png

There is no better time to debunk the myth that Arcsight Intelligent Security Operations solutions are complicated and difficult to use.  ArcSight’s differentiator in the marketplace is that it is exceptional at security, and while yes security can be simplified, security should only be simplified to a particular degree. ArcSight is extremely easy for security operations practitioners of any skill-level to use, while providing built-in security analytics and instant value to the security mission.  

 


Read Blog Article

Read more
0 0 1,119
Security_Guest Frequent Contributor.
Frequent Contributor.

ElasticArcSight.png

 There is exciting news happening here at ArcSight.  We have a new partnership which pairs the powerful ArcSight Data Platform with the Elastic stack in order to unlock new innovation in security operations.

 


Read Blog Article

Read more
0 0 2,974
Security_Guest Frequent Contributor.
Frequent Contributor.

ProtectionSM.jpg

Once again, a mega data breach was announced. Companies need to take steps now to mitigate the consequences of breaches by properly safeguarding their data.


Read Blog Article

Read more
1 0 540
Micro Focus Expert
Micro Focus Expert

To successfully secure software, we must make security ready, available, and easily consumable by the DevOps crowd. Fortify will continue to build integrations for necessary tools in the DevOps tool chain and empower you with the extensibility necessary to make the most effective integrations for your enterprise’s unique needs.CodeBugFix.jpg 

 


Read Blog Article

Read more
0 0 378
CaroleLoomis Contributor.
Contributor.

Protect Online Banner.jpeg

 No time or budget to travel to a security conference? Don’t worry, you can still develop your career as a security expert and enable your organization to deliver security at the speed of innovation. Secure your spot at the only hybrid security event this year – Protect Online.


Read Blog Article

Read more
0 0 328
Security_Guest Frequent Contributor.
Frequent Contributor.

The real cost of data breaches can be more when business disruption and legal costs are factored in. Instead, use Data Security to help with GDPR Compliance. gdpr.png

 


Read Blog Article

Read more
0 0 383
Micro Focus Expert
Micro Focus Expert

It’s finally here, day 1 for Micro Focus Software. After months of anticipation, preparation and a great deal of work, we are pleased to announce we have officially completed our spin-off from Hewlett Packard Enterprise and merged with Micro Focus. 


Read Blog Article

Read more
0 0 671
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.