Our vBulletin migration is complete.
Welcome vBulletin users! All content and user information from the Micro Focus Forums (vBulletin) site has been migrated to this site. READ MORE.
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog - Page 2

Micro Focus Expert
Micro Focus Expert

Five Ways to Integrate Security into Digital Transformation   .pngA new ebook highlighting secure digital transformation from DXC Technology and its partner Micro Focus discusses five omnipresent cybersecurity challenges and presents corresponding ways to overcome them.


Read Blog Article

Read more
0 0 1,508
Micro Focus Expert
Micro Focus Expert

Enforcing Third Normal Form in Database Design.pngIn our database security blog series, we identified six major topics, the first of which is enforcing third normal form (3NF) in database design. This is a fundamental data model necessary to guarantee relational integrity when we encrypt data items. Especially if one wants to rotate keys within a database.


Read Blog Article

Read more
0 0 409
Micro Focus Expert
Micro Focus Expert

Fortify comes alive with the Unplugged AppSec video series.pngWe have a few newsworthy things going on with Fortify on Demand, our Security-as-a-Service delivery model that includes both SAST and DAST techniques, including a bunch of new show-and-tell video demos to our library.


Read Blog Article

Read more
1 0 908
Security_Guest Frequent Contributor.
Frequent Contributor.

Detecting and preventing cyberattacks with anomaly detection and machine learning.pngAt the Gartner Security & Risk Management Summit June 17-20 Interset CTO Stephan Jou is delighted to have the opportunity to chat with attendees about how anomaly detection and machine learning can help give your organization a more proactive security posture.


Read Blog Article

Read more
0 0 1,689
Security_Guest Frequent Contributor.
Frequent Contributor.

SIEM is important for your business.pngSIEM software offers many benefits to organizations when it comes to event management, though some companies may not know that it can also be used for anomaly detection and automated reporting. Read more here!


Read Blog Article

Read more
1 0 1,455
Micro Focus Expert
Micro Focus Expert

How to maximize your experience at the Cyber Security Summit 2019.pngWe are just days away from the Micro Focus Cyber Security Summit in Dallas, which is happening June 11-13. If you are attending, here are some pro tips to maximize your experience and make the most of your time!


Read Blog Article

Read more
1 0 998
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.