Welcome Serena Central users! CLICK HERE
The migration of the Serena Central community is currently underway. Be sure to read THIS MESSAGE to get your new login set up to access your account.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Join the Micro Focus IAM Team at the Gartner Identity and Access Management Summit 2019 on Dec 10-12 in Las Vegas. Use our discount code IAMSP7 to receive $350 off at registration

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Data Security and the “as a service” economy.jpgThe nCipher nShield as a Service supports Micro Focus Voltage Data Security. Businesses migrating their storage and workloads to cloud-based environments can now take advantage of the flexibility offered by this innovative subscription-based services to support high-performance data protection solutions.


Read Blog Article

Read more
1 0 1,718
Micro Focus Expert
Micro Focus Expert

NCSAM Main.pngOctober is National Cybersecurity Awareness Month (NCSAM), and Micro Focus is a proud champion. Get some best practices for organizations to beef up their security posture.


Read Blog Article

Read more
2 0 5,348
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Live Webinar Security and Privacy Two Sides of the Same Coin.jpgTo begin October right, in the spirit of National Cybersecurity Awareness Month, register for ISMG’s live webinar, “Security and Privacy: Two Sides of the Same Coin?”


Read Blog Article

Read more
0 0 1,867
Micro Focus Contributor
Micro Focus Contributor

Top 5 Reasons Voltage SecureMail is in the Top 5 Email Encryption Tools.pngHere are the top 5 reasons that Voltage SecureMail ended up being named as one of the top 5 email encryption tools.


Read Blog Article

Read more
4 0 2,219
Micro Focus Expert
Micro Focus Expert

Key Takeaways from Protecting Relational Databases.pngIn this final post on relational database security, Author Jason Kazarian reviews some key topics from the series, which he trusts has helped you understand—if not implement—best practices for securing your relational data.


Read Blog Article

Read more
1 0 1,228
Micro Focus Expert
Micro Focus Expert

Use Case Examples for Protected Data.pngSecurity professionals need to learn how to control Format-Preserving Encryption, mostly by learning from practical examples. This Data Security blog shows several real-world use cases, and examine creative ways orgs can accomplish business objectives using protected data.


Read Blog Article

Read more
1 0 1,433
Security Blog Welcome to the Security Blog!
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.