Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Fortify User Group Sessions in USA, September 2019More information and registration here.

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Black Hat 2019 recap.pngThe Interset and ArcSight team joined cybersecurity pros in Las Vegas for two days of in-depth conversations about proactive and powerful threat detection at Blackhat 2019.


Read Blog Article

Read more
0 1 998
Security_Guest Frequent Contributor.
Frequent Contributor.

enterprise-security-trends.jpgThrough 2019 and beyond, a number of trends have taken root in the enterprise security space and these are defining the path security software must follow now and into the future. But what is enterprise security software and what are these trends?


Read Blog Article

Read more
1 0 1,618
Security_Guest Frequent Contributor.
Frequent Contributor.

Reduce Security Blind Spots with Interset UEBA and ArcSight Correlation.pngJoin Interset and Micro Focus at Black Hat 2019 to learn how to strengthen threat detection.


Read Blog Article

Read more
1 0 1,301
Security_Guest Frequent Contributor.
Frequent Contributor.

Relationships Are the Key to a Successful Security Analytics Tool.jpgThe different approaches to security analytics have varying degrees of accuracy. We take look at the security analytics definition, the major security analytics algorithmic techniques and then focus on one of the most effective techniques—correlation.


Read Blog Article

Read more
0 0 1,615
Security_Guest Frequent Contributor.
Frequent Contributor.

big-data-security-analytics.jpgCybersecurity has been an inherently reactive discipline. That’s because it hasn’t always been possible to predict the nature of future threats. Big data security analytics has the potential to change that.


Read Blog Article

Read more
2 0 3,249
Security_Guest Frequent Contributor.
Frequent Contributor.

network-security.jpgThe number of network touchpoints per user has grown exponentially. Network administrators must ensure a consistent application of security rules irrespective of the interface. That isn’t possible without deploying different types of network security systems.


Read Blog Article

Read more
1 0 1,754
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.