Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Micro Focus Virtual Universe 2020 has ended. Find our on-demand Universe sessions here!

Security Blog

Micro Focus Contributor
Micro Focus Contributor

The business case for responsible AI.pngIn early March 2020, Interset CTO Stephan Jou had the honor of meeting with the Privacy Commissioner of Canada. The reason for the gathering: regulation for responsible and ethical AI.


Read Blog Article

Read more
3 0 565
Micro Focus Contributor
Micro Focus Contributor

5 Key Takeaways from the RSA Conference 2020.jpgIn the flurry of sessions, meetings, and the expo floor, Security, Risk and Governance team noted five key takeaways which stood out during the RSA Security Conference 2020 in San Francisco. These takeaways were echoed from RSA sessions to individual talks surrounding the current state of security and what we need to do as security professionals to be successful in an ever-changing world.


Read Blog Article

Read more
1 0 3,580
Micro Focus Contributor
Micro Focus Contributor

What is AI for Security Operations.pngThe talent war is real in security operations. There is simply too much going on, and not enough skilled resources to effectively address the challenge. One of the key aspects of AI in security is about intelligent automation, which empowers your scarce resources to significantly accelerate detecting and addressing REAL threats; and rescues them from the sea of false positives and potentially catastrophic oversights.


Read Blog Article

Read more
2 0 3,358
Micro Focus Contributor
Micro Focus Contributor

Unsupervised Anomaly Detection Insider Threat.pngInsider threat could be an intentionally malicious employee who is stealing intellectual property from your organization or an innocent employee whose actions are inadvertently placing risk to your organization. How can we detect such threats? The answer, of course, is unsupervised anomaly detection.


Read Blog Article

Read more
4 0 3,768
Micro Focus Contributor
Micro Focus Contributor

Cybersecurity Data Science.jpgWhether you’re building a threat detection system using data science or evaluating a security vendor, this blog can serve as a guide to understanding how you can identify unusual behaviors in your enterprise with data science.


Read Blog Article

Read more
3 0 2,900
Trusted Contributor.
Trusted Contributor.

Machine Learning in the SOC—Part 3.pngMachine learning has the power to transform your security operations, but as with any powerful technology, it needs to be approached strategically. Interset has first-hand experience with helping organizations across the world implement and operationalize machine learning in their SOCs, and has identified four best practices that are critical for achieving success.


Read Blog Article

Read more
1 0 2,571
Security Blog Welcome to the Security Blog!
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.