Micro Focus is now part of OpenText. Learn more >

To hack your security culture, get the organization to focus on security, one person at a time.
Red-team your auth—before someone else does!
Verizon vs Ponemon: Who to believe? Here's what companies need to understand about two popular data breach cost estimates.
Artificial intelligence makes it possible to accurately process, verify, and authenticate identities at scale. Here's how.
If you make things that connect to the Internet, your things will need updates for way longer than three years.
Vulnerability researchers are understandably shy. Companies looking to improve software security should do outreach have a clear disclosure policy.
What can we learn from this unfortunate event? In this week’s Security Blogwatch, we ponder BGP and DNSSEC.
From AI to explainability, visualization, and data lakes, technologies beyond machine learning will change the way organizations fight data fraud.
No service is perfectly secure, but white-hat researchers are on your side. What can you learn from others’ mistakes?
Get your SIEM system geared up for GDPR with these best practices from data protection experts.

Pages