Micro Focus is now part of OpenText. Learn more >

Could the work of two new Nobelists help us calculate cyber risk more effectively? Yes it could. Here's how.
Data from BSIMM12 fills a report that provides a summary of trends and insights about the participating companies. Here are key takeaways.
Here are the big-picture issues that your organization must address to move beyond security as an afterthought.
Ransomware attacks are now more sophisticated than ever. Here are the six trends your security team should be tracking to stay cyber resilient.
Replay this panel discussion Webinar covering cloud adoption, security and privacy concerns—and best practices to address them.
Your security team needs to think about the root causes of security issues and stop addressing only the branches and symptoms.
Threat hunting is a kind of insurance policy that more than pays for itself. Here are key considerations and best practices for getting started.
With the new OWASP Top 10, application security teams have work to do. But if you embrace it, your team will get better. Here are top action items.
Malicious actors are increasingly targeting private repositories. Here are some of the techniques attackers use—and what you can do to stop them.
Here's why you need security orchestration, automation, and response functionality on your security operations team.

Pages