Micro Focus is now part of OpenText. Learn more >

SaaS misconfigurations may be responsible for up to 63% of security incidents. Here's how to address misconfigurations and take control of SaaS...
Zero-click attacks are insidious and on the rise. Here's how they work, how big the risk is, and seven steps to protect your organization.
Insider risk is amplified to 11 during milestones such as IPOs or M&As. Code42's Jadee Hanson has some strategies to help you prioritize data...
The ease at which attackers can compromise an IoT device is shocking. Organizations operating in the IoT space must rethink their security posture.
With cyber threats increasing every day, the days of siloed, tools-oriented approaches to combating hackers are coming to an end.
Make improving data privacy and protection practices an opportunity. Here's what your team needs to know about Turkey's KVKK data-protection law. 
Revamping your data security approach should be part of your transition to cyber resilience. Here's how format-preserving protection can help.
Here are key statistics that data security practitioners need to be aware of. The clear takeaway: New approaches are required.
Infrastructure-as-code configurations can contain dangerous errors, which is why cloud security teams are now recognizing the need to secure IaC...
Data masking makes it safer for companies to hold on to data they might need later, but they need to be educated. Here's what you need to know.

Pages