Micro Focus is now part of OpenText. Learn more >

5 min read - Developers may never become experts in security, and that's OK. But they must share a common goal of securing the product.
5 min read - Don't rely on old techniques to catch a crook. Here's why you should focus less on intrusion-detection and honeypots, and more on deception.
5 min read - Strong identity and access management makes your organization able to absorb the constant, inevitable changes businesses experience.
5 min read - Will the prospect of another massive security vulnerability such as Log4Shell drive open-source regulation? If it does, how will it control open...
7 min read - Developers who want an encryption algorithm that's highly secure—and will pass compliance—should go with products that can pass the FIPS 140-2 test.
5 min read - Bug bounties are on the rise but hackers still often—and unfairly—get a bad rap. Here's how they are protecting your data.
5 min read - The call for secure software development makes security pros in high demand. Know your code and standards and you'll be at the front of the pack.
7 min read - Data from BSIMM12 fills a report that provides a summary of trends and insights about the participating companies. Here are key takeaways.
6 min read - "Reimagining Cyber" is a podcast series highlighting common challenges, trends, and solutions for today’s cybersecurity professionals.
Photo by Amr Taha™ on Unsplash
5 min read - As malware detection tools continue to evolve, AI will play a larger and more important role. Here's how and why.
Robot lego helping lego man fix computer

Pages