Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog - Page 2

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Identifying critical assets.pngFrom a data security practice, we want two things. First, a list of critical digital assets: we can only protect items already in a digital form. And second, a confidence rating from zero to one hundred percent (0-100%) that we have identified all of the critical assets we either have an interest in or obligation to protect.


Read Blog Article

Read more
1 0 892
Micro Focus Expert
Micro Focus Expert

Kaizen for the Modern Enterprise.pngThe theme for this year’s RSA Conference is easier said than done: BETTER. I really like the idea of the entire community of cyber security professionals thinking towards making the world a more secure place through becoming better. Here are three reasons why you should visit the Micro Focus Booth 4508 in the North Hall


Read Blog Article

Read more
2 0 829
Micro Focus Contributor
Micro Focus Contributor

Why is “Identity Powers Everything” the right approach to security.pngMany organizations do not fully utilize Identity and Access Management (IAM) to support their overarching security initiatives. One of the largest reasons is because IAM teams and security teams are often two completely different groups, with different areas of focus.


Read Blog Article

Read more
3 0 848
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

The Tragic Downside of Customer Information Management.pngThe same tools that can be used to discover, classify and disposition data for Customer Information Management purposes can be used to protect it, too. Secure Content Management, our comprehensive data governance suite can do all of that to both structured and unstructured data.


Read Blog Article

Read more
1 0 679
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Applying RSA’s .pngThis year’s RSA Security Conference theme is “better.” One critical set of initiatives that you need to keep focused on getting right are your digital transformation projects. Because if the early indicators are actual signs of the times, lagging or failing isn’t a good option. 


Read Blog Article

Read more
2 0 754
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

NewRelease1.pngFortify on Demand delivers application security as a service, providing customers with security testing and support needed to easily create, supplement, and expand a Software Security Assurance in as little as just one day. Check out the new release features.


Read Blog Article

Read more
0 0 2,049
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.