Micro Focus is now part of OpenText. Learn more >

Security solutions based on AI, ML, zero trust, analytics, and encryption can mitigate the potential cost of a breach, the data shows. Here's how.
Here's why CISOs need to embrace cloud-native, get to know its advantages, and understand the change it introduces to security practices.
Adopting a threat modeling framework, implementing processes for managing the attack surface, and aggressively pushing automation are key.
By requiring an SBOM from software providers, the EO recognizes how software is put together today. But what's in the SBOM is what matters.
A more agile approach to security that involves behavioral analysis will help security teams sleep better at night. Here's why.
Yes, security pros should know how to code. Here's how having programming skills enhances five different cybersecurity roles.
The moral: One to watch. And if you’re already watching Rust, this could be its chasm-crossing moment.
Fool me once, sure. But is there an appropriate saying for what to do when you get fooled for the 11th time?
The moral: Active threat response is key. How far will you go to root out bad actors?
The moral: What secrets might your org be leaking via free apps? Is there a red-team opportunity here?

Pages