Recent Activity
liasson
0
0
9
smkornegay
by smkornegay Respected Contributor. in SMG User Discussions 2 hours ago
0 14 224
0
14
224
stagefright
0
2
26
AndersG
0
2
60
Solid1723
0
2
57
COEST
0
0
39
COEST
0
0
13
lemonh20
by Contributor.. lemonh20 Contributor.. in Fortify User Discussions yesterday
0 7 156
0
7
156
rlinnenbur
0
0
44
chiraggajjar1
0
9
141
jannusuraj
0
1
83
otkritie
by Respected Contributor.. otkritie Respected Contributor.. in Fortify User Discussions yesterday
0 1 157
0
1
157
simeonof
1
5
421
dgersic
0
1
48
prasenjitmass
0
1
48
COEST
0
0
49
kseb
0
8
83
COEST
0
0
15
COEST
0
0
10
IanB65
0
0
14
booktrunk
0
0
14
yhann1
0
2
466
BTO
0
1
100
stelgenkamp
0
6
1185
jdkoerner
0
11
215
-Magnus-
by -Magnus- Super Contributor. in SSPR User Discussions Friday
0 2 696
0
2
696
nicolasosorio
0
2
373
jlrodriguez
0
3
74
bawise
0
3
295
achinayoung_wau
0
1
39
jburchhardt
0
1
100
jvybihal
0
4
113
Satz
0
2
86
mudit_gupta
0
2
64
iamnacho
0
2
63
peter_lambrechtsen
3
5
4405
COEST
0
0
62
COEST
0
0
80
zargaran
0
0
343
parfuar
0
2
143
aortiz1
0
1
66
Thierry
by Thierry Contributor. in ArcSight User Discussions Friday
0 5 233
0
5
233
mcurrie
0
2
85
SecRaj
by SecRaj New Member. in Fortify User Discussions 2019-10-17
0 0 99
0
0
99
achinayoung_wau
by achinayoung_wau Respected Contributor. in PAM User Discussions 2019-10-17
0 6 136
0
6
136
Security Neighborhood Welcome to the Security Neighborhood!
Thanks for joining us! This neighborhood within our community is focused on supporting security products. Unleash the power of new technology without putting your business at unnecessary risk. Learn more about Security.
News & Information

CSS2019-OnDemand-CommunityRolling-300x250.png

 

Supercharging Insider Threat Detection in the SOC
 
Supercharging Insider Threat Detection in the SOC 

Recent insider threat incidents show the value of a carefully designed insider threat program....

Get beyond short-term: Secure your apps by stage and role

For the second year in a row, insecure software applications have been the main culprit of breaches, according to Verizon's 2019 Data Breach Investigations Report. But applying methods for shoring up your applications by stage and role will help.

Latest Blogs

Blog articles of interest across this community

OSINT News - October 21, by Bart Otten

Winnti Group was planning a devastating supply-chain attack against Asian manufacturerSecurity Affairs Winnti Group is back with a new modular Win bac...
in Security Research Blog yesterday
0
0
49

The 4-1-1 on SecOps and Machine Learning

Hello, operator? The truth about machine learning, please. If you’ve ever wished for a live fact-checker during a conversation with a security vendor ...
in Security Blog 2019-10-16
3
0
996

2019 AppSec Risk Report Key Takeaways

The core of Fortify and its mission is around enabling organizations to deliver secure software. Research is at the heart of that core goal. In order ...
in Security Blog 2019-10-15
1
0
1559
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.