Micro Focus is now part of OpenText. Learn more >

Mobile, IoT and cloud have blurred the hard lines that once defined the security perimeter. Zero-trust is one way to regain control.
Dissatisfaction with SIEM tools is rising. Will security automation and orchestration tools knock them out?
Don’t keep your data to yourself. Instead, learn to share with your industry peers—even competitors—for the greater good of the Internet.
Hackers are beating organizations today because AV and IDS are too slow. With AI, your cybersecurity can reach machine speed.
Password authentication alternatives are here. But a permanent replacement for passwords is still a work-in-progress.
If the FBI and DoJ are now criminalizing every white-hat who creates a PoC, they risk marginalizing the US’s role in infosec.
Proposed legislation would allow companies a limited ability to hack back at attackers. Here's what security pros need to know.
Ignore the politics. If Bossert, Huntsman, and Scaramucci can be fooled this easily, what about your executives? Time for some Red Team exercises?
As the ISACA training program grows, it will expand beyond security pros to engineers and developers—in the enterprise, academia and practitioners.
Calls for a renewed focus on traditional defense haunted by rising threats such as IoT and containers.

Pages