Micro Focus is now part of OpenText. Learn more >

The latest quantum-computing breakthrough is great, but there's still no fear of today's security encryption being broken. Here's why.
Use format-preserving hashing to anonymize sensitive data — and save your businesses money.
Complying with the GDPR's right to erasure-mandates may not be as hard as you think. Luther Martin explains.
Here's why you should structure your unstructured data security strategy, and innovations to help your users, apps, and data.
Are you a target for state actors? Make sure you are monitoring your platforms accordingly.
Quantum computing is not the end of encryption as we know it. Quantum-resistant algorithms are available today.
Don't be the developer who screws up and lets millions of personal records out into the wild. Here's what to look out for.
Data protection laws are getting more numerous and complex. Here's what your team needs to know.
Key derivation function (KDF) can make the task of key management vastly easier and less expensive. Here's how to get started.
If the police can do it, so can thieves. Takeaway: Unmanaged BYOD is risky.

Pages