Micro Focus is now part of OpenText. Learn more >

Don’t get complacent: These mitigating kernel patches and microcode won't save you.
Bug bounty programs are a good way to be proactive, but rushing ahead can do more harm than good. Here's what to consider first.
Don’t buy in to the myth that containers give you isolation. Check your privilege.
Almost all companies have cultural issues that affect security decision-making. Here are key steps to building a security culture in yours.
When you make a mistake, either apologize or not. Don’t sit on the fence. And don’t be so selective with your bug bounties.
2018 was a wake-up call for Kubernetes. With its popularity, there are bound to be more attacks. Here's why, and what you can do about it.
The moral of the story: Ensure you act on security reports from civilians. How hard can it be?
Takeaways: Audit your open ports—including RDP. And make sure your backups are secure (not to mention recoverable).
Here's why you need to adopt a trichotomic, or three-part, security model that includes security in depth, DevSecOps, and security validation.
Could your data center be described as "aging" and "sprawling"? And if you use a hosting company, enable 2FA and don't stay logged in.

Pages