Welcome Serena Central users! CLICK HERE
The migration of the Serena Central community is currently underway. Be sure to read THIS MESSAGE to get your new login set up to access your account.
Recent Activity
6423241
0
10
131
kab12312
by kab12312 Respected Contributor. in eDirectory User Discussions 23m ago
0 6 85
0
6
85
migsam76
0
4
31
achinayoung_wau
0
1
12
sma2006
by sma2006 Outstanding Contributor. in eDirectory User Discussions 2 hours ago
0 3 27
0
3
27
Saurabh H
1
1
10
DIPESH MISHRA
0
3
65
benh3103
by benh3103 Contributor. in ArcSight User Discussions 3 hours ago
0 1 38
0
1
38
vidhya
0
3
43
clarja
0
9
1088
bishop182
0
9
850
rivey
0
0
12
COEST
0
0
3
dbentley1
0
11
165
eelgheez
0
6
166
Security Neighborhood Welcome to the Security Neighborhood!
Thanks for joining us! This neighborhood within our community is focused on supporting security products. Unleash the power of new technology without putting your business at unnecessary risk. Learn more about Security.
News & Information

CSS2019-OnDemand-CommunityRolling-300x250.png

 

Supercharging Insider Threat Detection in the SOC
 
Supercharging Insider Threat Detection in the SOC 

Recent insider threat incidents show the value of a carefully designed insider threat program....

Get beyond short-term: Secure your apps by stage and role

For the second year in a row, insecure software applications have been the main culprit of breaches, according to Verizon's 2019 Data Breach Investigations Report. But applying methods for shoring up your applications by stage and role will help.

Latest Blogs

Blog articles of interest across this community

Machine Learning in the SOC—Part 2: Identify Your Use Cases

You don’t have to have been in the cybersecurity industry for long to feel the effects of “buzzword fatigue.” In our world, terms like artificial inte...
in Security Blog 8 hours ago
1
0
125

WannaCry? Not anymore. Software vulnerability tracking debuts in ZENworks2020!

For many organizations, 2017 was a rough security year. Cyberattacks made news repeatedly, headlined by WannaCry ransomware attack in May, Petya ranso...
in Security Blog yesterday
0
0
519

Using layered analytics to reduce damage from cyber-attacks

The Cost of Breaches In 2018, British Airways had a data breach. Not only did they lose the information and trust of their customers, but they were fi...
in Security Blog yesterday
1
0
425
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.