Micro Focus is now part of OpenText. Learn more >

Employees, long considered the weakest link in a company’s security posture, can become a valued asset in maintaining security.
Security is widespread and mainstream, but security culture has not kept pace with threats. Here are six steps to developing a security culture.
Hope is not a security strategy. Here's how you can secure your enterprise against IoT cyberattacks and data breaches.
Attackers have started turning to malicious crypto-mining to turn a quick buck. Here's how to protect your organization.
Nothing is secure from physical access: Where there’s a will, there’s an exploit
Mobile, IoT and cloud have blurred the hard lines that once defined the security perimeter. Zero-trust is one way to regain control.
OWASP's Threat Dragon is poised to overtake the industry as the best possible choice for threat modeling.
Making data privacy a priority is no longer an option. Here are three things developers can to do get GDPR-compliant right away.
An open-source SOC can work for some organizations. But experts urge the need to look at the total cost of this approach. Here are the ups and downs.
From AI to explainability, visualization, and data lakes, technologies beyond machine learning will change the way organizations fight data fraud.

Pages