Micro Focus is now part of OpenText. Learn more >

The moral of the story: Ensure you act on security reports from civilians. How hard can it be?
This is the year we need to take more action and talk less about making DevSecOps happen.
Takeaways: Audit your open ports—including RDP. And make sure your backups are secure (not to mention recoverable).
Here's why you need to adopt a trichotomic, or three-part, security model that includes security in depth, DevSecOps, and security validation.
Could your data center be described as "aging" and "sprawling"? And if you use a hosting company, enable 2FA and don't stay logged in.
This is horrific on so many levels. Privacy violation on this scale wouldn’t be remotely acceptable in any other civilized society.
There's a security conference tailored to every IT security pro's needs. Use our guide to find the right shows for your team.
In this week’s Security Blogwatch, we look back on each month of 2018's foolishness. Keep reading in 2019 for more get-to-the-point news and comment.
Security experts share how to make your software pipelines and container deployments safe, and your DevSecOps GDPR-compliant.
While most enterprises are confident that their apps are well-tested and secure, concerns are growing that those tests may have missed something.

Pages