Micro Focus is now part of OpenText. Learn more >

This is horrific on so many levels. Privacy violation on this scale wouldn’t be remotely acceptable in any other civilized society.
There's a security conference tailored to every IT security pro's needs. Use our guide to find the right shows for your team.
In this week’s Security Blogwatch, we look back on each month of 2018's foolishness. Keep reading in 2019 for more get-to-the-point news and comment.
Beware: Playing fast and loose with your users’ privacy will catch up with you, sooner or later.
OWASP's new Top Ten list of IoT Vulnerabilities highlights continuing challenges. Here's the state of IoT security—and what to expect in 2019.
Security and IT Ops will be forced to work more closely together in 2019. Here's why, how it will unfold, and how you can take the initiative.
The moral of the story: Find your own vulnerabilities before someone else does.
Here's what you need to know about whitelisting and blacklisting, with an explainer for which approach might best complement your security strategy.
Always be ready to patch—at a moment’s notice. And make sure that your infrastructure is still using supported versions of Kubernetes.
Make sure you’re not still giving old-skool advice, like “look for the lock.”

Pages