Recent Activity
farmers_LSD
0
3
19
Daniela Bonilla
0
0
4
Daniela Bonilla
0
0
5
Daniela Bonilla
0
0
9
tonyssbear
by tonyssbear Respected Contributor. in ArcSight User Discussions yesterday
0 2 85
0
2
85
Santiago
0
1
28
abergvall
1
1
22
Mark G
0
1
73
jaydeepmehta15
0
2
135
acshearer
0
4
40
isaconco
by Micro Focus Contributor Micro Focus Contributor in ArcSight Investigate yesterday
0 0 6
0
0
6
isaconco
by Micro Focus Contributor Micro Focus Contributor in ArcSight Investigate yesterday
0 0 6
0
0
6
COEST
0
0
16
COEST
0
0
6
COEST
0
0
6
Security Neighborhood Welcome to the Security Neighborhood!
Thanks for joining us! This neighborhood within our community is focused on supporting security products. Unleash the power of new technology without putting your business at unnecessary risk. Learn more about Security.
News & Information

CSS2019-OnDemand-CommunityRolling-300x250.png

 

Supercharging Insider Threat Detection in the SOC
 
Supercharging Insider Threat Detection in the SOC 

Recent insider threat incidents show the value of a carefully designed insider threat program....

Get beyond short-term: Secure your apps by stage and role

For the second year in a row, insecure software applications have been the main culprit of breaches, according to Verizon's 2019 Data Breach Investigations Report. But applying methods for shoring up your applications by stage and role will help.

Latest Blogs

Blog articles of interest across this community

September is National Insider Threat Awareness Month

This month marks the first-ever National Insider Threat Awareness Month, as pronounced by the National Counterintelligence and Security Center (NCSC)....
in Security Blog Tuesday
1
0
472

New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

In today’s world, we know that most security breaches occur because of application vulnerabilities. We also know that most typical software applicatio...
in Security Blog 2019-09-12
1
0
979

Cybersecurity Summit On-Demand: The Path to Universal Policy Management

Due to the complexity and hybrid nature of today’s environments, managing security policies across both on-premises and cloud resources was a popular ...
in Security Blog 2019-09-05
2
0
936
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.