Do you have feedback on our new interface?
Do you have feedback on our new interface? Let us know HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

RSA blog1.pngTo meet security challenges, come to the RSA Conference to see how to take a holistic, analytics-driven approach to securing what matters most—identities, apps, and data. Better yet, see the familiar faces that make up our comprehensive security portfolio:


Read Blog Article

Read more
0 0 2,196
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

The Most Pressing Issues Regarding Application Security.pngA survey by BizTechInsights reveals the most common factors that impact organizations’ implementation and use of application security solutions, what they consider to be the most pressing issues regarding their application security solution, and more.


Read Blog Article

Read more
1 0 1,169
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

In the latest version of OWASP Top 10 released in 2017, some types of vulnerabilities which no longer represent a serious threat were replaced with ones most likely to pose a significant risk. See what has changed since the last version of the Top 10 in 2013.A Developers Guide to the OWASP Top 10.png

 


Read Blog Article

Read more
0 0 1,293
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Ensuring your applications are secure doesn’t have to be a cumbersome process. With the right program and tools, you can improve or start your organization’s security initiative without getting in the way of developers’ productivity. See how:Get Started with Seamless AppSec in One Day.png 


Read Blog Article

Read more
1 0 1,198
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Having a clear path to integrated and automated application security with measurable KPIs, will increase your organization’s opportunity to succeed. Here are a few important things to consider when building the roadmap for that journey.Getting Started with Seamless Application Security.png 


Read Blog Article

Read more
1 0 1,928
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

In part three of the Seamless Application Security blog series, Brent Jenkins of the Fortify Team breaks down the “5 Steps to Make Application Security Seamless.”5 Steps to Make Application Security Seamless.png


Read Blog Article

Read more
1 0 2,460
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.