Recent Activity
smkornegay
by smkornegay Respected Contributor. in SMG User Discussions 31m ago
0 10 165
0
10
165
BTO
0
1
64
stelgenkamp
0
6
1166
jdkoerner
0
11
149
dgersic
0
0
24
simeonof
1
3
375
-Magnus-
by -Magnus- Super Contributor. in SSPR User Discussions Friday
0 2 694
0
2
694
nicolasosorio
0
2
369
jlrodriguez
0
3
59
bawise
0
3
246
AndersG
0
1
39
achinayoung_wau
0
1
33
jburchhardt
0
1
89
jvybihal
0
4
98
Satz
0
2
77
Security Neighborhood Welcome to the Security Neighborhood!
Thanks for joining us! This neighborhood within our community is focused on supporting security products. Unleash the power of new technology without putting your business at unnecessary risk. Learn more about Security.
News & Information

CSS2019-OnDemand-CommunityRolling-300x250.png

 

Supercharging Insider Threat Detection in the SOC
 
Supercharging Insider Threat Detection in the SOC 

Recent insider threat incidents show the value of a carefully designed insider threat program....

Get beyond short-term: Secure your apps by stage and role

For the second year in a row, insecure software applications have been the main culprit of breaches, according to Verizon's 2019 Data Breach Investigations Report. But applying methods for shoring up your applications by stage and role will help.

Latest Blogs

Blog articles of interest across this community

The 4-1-1 on SecOps and Machine Learning

Hello, operator? The truth about machine learning, please. If you’ve ever wished for a live fact-checker during a conversation with a security vendor ...
in Security Blog 2019-10-16
3
0
823

2019 AppSec Risk Report Key Takeaways

The core of Fortify and its mission is around enabling organizations to deliver secure software. Research is at the heart of that core goal. In order ...
in Security Blog 2019-10-15
1
0
1399

ESET discovers Attor, a spy platform with curious GSM fingerprinting - and other news articles

Apple zero-day exploited in new bitpaymer campaign http://blog.morphisec.com/apple-zero-day-exploited-in-bitpaymer-campaign Apple Zero-Day Exploited i...
in Security Research Blog 2019-10-14
0
0
125
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.