Micro Focus is now part of OpenText. Learn more >

Organizations should adopt best practices focused on data and app security, identity management, and network monitoring. Here are the key ones.
With objectives and key results in play, software shifts from being a supporting player to becoming a driver of success. Here's how to make it happen.
To stay on top of IoT security, apply lessons from application security to your security stance. Here's what you need to know and how to get started.
As software vendors look to next-gen computing to address a looming data glut, developer support is critical to ensuring these new technologies...
Runtime app self-protection technology is still nascent, but it solves some sticky problems. This article explores and explains the value of RASP...
Data from the 2016 DevOps Salary Report shows that companies are investing in people who have the skill sets that can make IT a strong, competitive...
ChatOps makes it too easy for everyone to control everything. Here's what to watch out for.
The complexity of mobile UX design and development is analogous to the game of chess—endless possibilities, and a need to get into the head of the...
Software-quality metrics are interesting, but none of them matter if users hate your software and the business loses money. Read why the old...
The morale of the story: User-controlled endpoints are not secure! Design for an adversarial world; pen-test and and red-team the result.

Pages