Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Ensure Privacy Protection.jpgDigital transformation is key to business success but is also a major vulnerability when it comes to data privacy. Learn about the approaches, methodologies, and technology that can help you face privacy challenges during your digital transformation.


Read Blog Article

Read more
0 0 18
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Privacy and Data Protection.jpgThere is a lot more data at risk today than there has been in the past. The explosion of personal data being collected, harnessed and used means that companies have to be increasingly aware of how they manage it.


Read Blog Article

Read more
1 0 254
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Addressing Governance and Regulatory requirements.pngNow it’s time to delve into the third process in a data security practice, which is assessing data governance and regulatory requirements.


Read Blog Article

Read more
1 0 4,575
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Evaluating threats against and vulnerabilities of critical assets.pngIn the last post in my series on Data Security, we defined a process for identifying critical assets and intellectual property that are worth protecting. Now it’s time to discuss the second process, namely evaluating threats against and vulnerabilities of these identified critical assets.


Read Blog Article

Read more
0 0 672
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Identifying critical assets.pngFrom a data security practice, we want two things. First, a list of critical digital assets: we can only protect items already in a digital form. And second, a confidence rating from zero to one hundred percent (0-100%) that we have identified all of the critical assets we either have an interest in or obligation to protect.


Read Blog Article

Read more
1 0 892
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

The Tragic Downside of Customer Information Management.pngThe same tools that can be used to discover, classify and disposition data for Customer Information Management purposes can be used to protect it, too. Secure Content Management, our comprehensive data governance suite can do all of that to both structured and unstructured data.


Read Blog Article

Read more
1 0 679
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.