Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Expert
Micro Focus Expert

Key Takeaways from Implementing a Data Security Practice.pngNow that Jason Kazarian’s blog series on building a data security practice is complete, he takes one last post to summarize the journey with some key takeaways.


Read Blog Article

Read more
1 0 204
Security_Guest Frequent Contributor.
Frequent Contributor.

A Wake-Up Call for CIOs.jpgIn a rapidly expanding digital economy with no boundaries, security is an ever-evolving and time-consuming matter. It’s a complex, continuous, long-term task that can only be achieved with the right partner. The question that CIOs need to ask themselves is, “Are we doing enough?”


Read Blog Article

Read more
2 0 857
Micro Focus Expert
Micro Focus Expert

Improving and Monitoring a Data Security Practice.jpgJust as a car needs regularly scheduled maintenance to avoid become a repair nightmare, a data security practice needs regular improving and monitoring.


Read Blog Article

Read more
1 0 646
Micro Focus Expert
Micro Focus Expert

Reducing Cost and Increasing Performance of Implementing Data Security .pngOrganizations can mitigate the direct and indirect costs of data security by reducing the number of times needed to run data protection IT processes. This can be done in three different ways: protect data at the application level, avoid decryption when possible, and reduce the life cycle key management cost.


Read Blog Article

Read more
2 0 959
Micro Focus Expert
Micro Focus Expert

John Delk.jpgWith our 2019 Micro Focus Cybersecurity Summit set for June of this year, get the highlights of the 2018 Summit, which introduced our expanded security portfolio. Then make plans to attend this year!


Read Blog Article

Read more
0 0 1,239
Micro Focus Expert
Micro Focus Expert

Implementing Data Security Throughout the Enterprise.pngFinally, we are now ready to roll data protection out throughout the enterprise. Let’s take a process-driven approach and identify our inputs, activities, outputs, entry, and exit criteria, says Jason Kazarian in his latest blog on implementing a data security practice.


Read Blog Article

Read more
2 0 1,436
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.