Micro Focus is now part of OpenText. Learn more >

Creating a logo and marketing hype as though each bug brings on the end times is harmful. The security community should decide which flaws receive...
To test all the right apps at all the right times, you need tools. Kevin Beaver identifies four key characteristics of effective application...
There will be hardships throughout any security plan, but don't abandon it. You'll risk losing your Masters.
The Panama Papers are the latest in a series of exposures that should spur enterprises to re-evaluate security. Here are four areas you should...
The conclusion from the Panama Papers breach is that there was zero security awareness and no effort in place at Mossack Fonseca. Here's what you...
There's plenty of opportunity for security pros, but there's a shortage of them to fill spots. John Mello reports on what the security skills gap...
The use of encryption has become pervasive in the enterprise. That's why allowing anything but the strongest encryption would have far-reaching...
The Cybersecurity Information Sharing Act (CISA) holds great promise. But will liability concerns foil it? Will CISA actually work? Only time will...
Taking a risk-managed approach to security has strategic advantages. Danny Rogers says dark web data intelligence is key to finding and stopping...
By executing a risk-based assessment, you can create efficient penetration testing plans that concentrate efforts where they're needed most. Here's...

Pages