Micro Focus is now part of OpenText. Learn more >

Quantum computing is not the end of encryption as we know it. Quantum-resistant algorithms are available today.
Don't be the developer who screws up and lets millions of personal records out into the wild. Here's what to look out for.
Data protection laws are getting more numerous and complex. Here's what your team needs to know.
Key derivation function (KDF) can make the task of key management vastly easier and less expensive. Here's how to get started.
If the police can do it, so can thieves. Takeaway: Unmanaged BYOD is risky.
Format-preserving encryption (FPE) is key to protecting your legacy data while keeping your apps and network humming.
WPA3 is here. You'd better start planning for a new network kit.
What would you do if you had a saboteur? How would you know?
Here's why random key generation is necessary and how to measure if you are doing this well enough.
Don't just hide behind the "not a bug" reply. Protect your cloud customers!

Pages