Micro Focus is now part of OpenText. Learn more >

2018 was a wake-up call for Kubernetes. With its popularity, there are bound to be more attacks. Here's why, and what you can do about it.
The moral of the story: Ensure you act on security reports from civilians. How hard can it be?
Takeaways: Audit your open ports—including RDP. And make sure your backups are secure (not to mention recoverable).
Here's why you need to adopt a trichotomic, or three-part, security model that includes security in depth, DevSecOps, and security validation.
Could your data center be described as "aging" and "sprawling"? And if you use a hosting company, enable 2FA and don't stay logged in.
This is horrific on so many levels. Privacy violation on this scale wouldn’t be remotely acceptable in any other civilized society.
There's a security conference tailored to every IT security pro's needs. Use our guide to find the right shows for your team.
In this week’s Security Blogwatch, we look back on each month of 2018's foolishness. Keep reading in 2019 for more get-to-the-point news and comment.
Beware: Playing fast and loose with your users’ privacy will catch up with you, sooner or later.
OWASP's new Top Ten list of IoT Vulnerabilities highlights continuing challenges. Here's the state of IoT security—and what to expect in 2019.

Pages