Micro Focus File Analysis Suite: Helping IT admins identify, manage and secure sensitive information

Micro Focus announced the release of Micro Focus File Analysis Suite, offering IT administrators a comprehensive data lifecycle management solution for identifying, managing and securing sensitive information across the enterprise. As organizations imp… Continue reading Micro Focus File Analysis Suite: Helping IT admins identify, manage and secure sensitive information

The dangers of assumptions in security

Assuming things is bad for your security posture. You are leaving yourself vulnerable when you assume what you have is what you need, or what you have is working as advertised. You assume you are protected, but are you really? Don’t just trust – … Continue reading The dangers of assumptions in security

How adaptive trust makes security efficient

Zero trust is a comprehensive security framework that requires everyone—and every service account—to authenticate identity before entering the corporate network. Every app and every device, as well as all the data they contain, must also be verified fo… Continue reading How adaptive trust makes security efficient

Zero Trust: Beyond access controls

As the Zero Trust approach to cybersecurity gains traction in the enterprise world, many people have come to recognize the term without fully understanding its meaning. One common misconception: Zero Trust is all about access controls and additional au… Continue reading Zero Trust: Beyond access controls

New infosec products of the week: January 17, 2020

Masergy Shadow IT Discovery: Automatically identify unauthorized SaaS applications Masergy Shadow IT Discovery immediately scans and identifies all applications, providing clients visibility through the SD-WAN management portal. Until now, IT departmen… Continue reading New infosec products of the week: January 17, 2020

Micro Focus AD Bridge 2.0: Extending security policies and access controls to cloud-based Linux

Micro Focus released Micro Focus AD Bridge 2.0, offering IT administrators the ability to extend Active Directory (AD) controls from on-premises resources, including Windows and Linux devices to the cloud – a solution not previously offered in th… Continue reading Micro Focus AD Bridge 2.0: Extending security policies and access controls to cloud-based Linux

New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

In today’s world, we know that most security breaches occur because of application vulnerabilities. We also know that most typical software applications are, on average, comprised of 85% open source software. These facts are changing the way… Continue reading New Micro Focus, Sonatype Partnership Provides 360 Degree View of AppSec

How passwords paved the way for new technology

On July 15 we lost a major contributor to modern-day IT security – Dr. Fernando Corbato, the inventor of the password. Back in the early 1950s, computers could only do single processing jobs. Due to this limitation, it meant that multiple users c… Continue reading How passwords paved the way for new technology

MicroFocus joins Endace to accelerate cybersecurity threat investigation and response

Endace, specialists in high speed network recording and analytics hosting, announced a new partnership with Micro Focus. In addition, the companies also announced new integration between ArcSight Enterprise Security Manager and the EndaceProbe Analytic… Continue reading MicroFocus joins Endace to accelerate cybersecurity threat investigation and response

Why identity is the foundation of security

Once upon a time, companies secured their valuable information by locking file cabinets and installing passwords and firewalls around databases and systems in office-based computers. Maybe they also had video cameras to monitor the premises. Those days… Continue reading Why identity is the foundation of security