Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Find out what’s new in Micro Focus Fortify 20.1 in our new AppSec webinar on June 16 and see how to protect your applications from security vulnerabilities. Register today! 

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Micro Focus Named an Overall Leader in 2020 KuppingerCole Leadership Compass.pngMicro Focus has been named once again as an Overall Leader in the KuppingerCole Leadership Compass for Identity Governance and Administration. Check it out!


Read Blog Article

Read more
8 0 1,945
Micro Focus Expert
Micro Focus Expert

Taking the Friction out of Zero Trust at Micro Focus Universe.pngTo build a The Zero Trust security model, start with a solid authentication foundation. See how to do that in our Zero Trust sessions at Micro Focus Virtual Universe.


Read Blog Article

Read more
1 0 3,466
Micro Focus Contributor
Micro Focus Contributor

Year of the Rat – Mitigating IP Theft on Linux.pngIt’s a bit fitting that this current Chinese New Year is the year of the rat, given the key findings in a recently published threat intelligence report that had a major emphasis on the use of RATs (remote access Trojans) to gain a beachhead into an organization. With many  hacking groups try to gain access to neglected and undermanaged Linux servers, AD Bridge provides the capabilities of applying an added layer of security via configuration policies to harden your Linux resources and assist with mitigating the risk of a breach.


Read Blog Article

Read more
6 0 2,042
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Why Full Identity Governance Matters.jpgA full identity governance system closes the door to access mistakes and misjudgments. It allows companies to create detailed access rules and enforce them automatically at all times. It also helps managers make informed decisions.


Read Blog Article

Read more
5 0 2,936
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Five Tips to Enable Secure Access for Your Remote Workforce.jpgDue to the Covid-19 pandemic, organizations across the world are facing an unprecedented work situation that is forcing a large number of employees to work remotely. Enabling a reliable, consistent and secure access to applications for your remote users at this time is critical.


Read Blog Article

Read more
5 0 3,358
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Identity Governance and Administration (IGA) in a Zero Trust World.jpgA robust Identity Governance and Administration program provides the foundation for zero trust and makes it possible to implement a Zero Trust security model without increasing the burden on your already over-worked IT support team. Perhaps even more importantly it can reduce the impact to your business that can be caused by tightened security policies.


Read Blog Article

Read more
7 0 4,479
Security Blog Welcome to the Security Blog!
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.