Micro Focus is now part of OpenText. Learn more >

The letter of the law is one thing, but keep an eye on how it's being interpreted in the courts.
Prepare and harden your AI and machine-learning systems before attackers learn how to do so.
Google is transferring control of Kubernetes to the Cloud Native Computing Foundation—and that's a good thing. Here's why.
The widely used "separate team" automation model is destined to fail—except in one case. Here's why, and what you should be doing instead.
The New York City’s Cyber Commands move to threat modeling quickly yielded major security payoffs. Here are four takeaways.
The type of testing you do should depend on the type of project you're working on. One size does not fit all.
Here's how to apply ITSM principles to all areas of your business, and how to get leaders on board. (Spoiler: It has to do with money.)
API keys, SSH-keys, passwords, and OAuth 2 are hard to secure and manage in today's cloud-native apps. Here is an essential guide.
Journals aren't just for angst-ridden adolescents. They can be a valuable tool to become a better tester. Here's how to start yours.
Lesson: Don't be tempted to hide huge privacy changes behind vapid PR spin.

Pages