RSA® Conference 2019, San Francisco, March 4-8, 2019
RSA Conference 2019 is the place to be for the latest in cybersecurity data, innovation, and thought leadership. From March 4 – 8, San Francisco will come alive with cybersecurity’s brightest minds as they gather to discuss the industry’s newest developments. Register now.
New Fortify Software Security Content (2018 Update 4)
Fortify Software Security Research (SSR) is pleased to announce the immediate availability of updates to Fortify Secure Coding Rulepacks (English language, version 2018.4.0), Fortify WebInspect SecureBase (available via SmartUpdate), and Fortify Premium Content. Read more.
Voltage SecureData for Vertica - Prevent Hackers, Headlines, and Headaches
The Voltage SecureData Add-on for Vertica brings a unique data-centric approach to the encryption of data in Vertica, with sensitive information preserved end-to-end, from the moment of capture through business analysis applications to the backend data store. Read more.
RZZ Rechenzentrum AG
RZZ Rechenzentrum leverages Micro Focus® ZENworks® Configuration Management to efficiently deliver software to a global workforce, while maintaining control of licensing costs. Read more.
Secure your Big Data Analytics for GDPR Compliance – Learn how Voltage SecureData for Vertica enables trusted big data to move between untrusted environments. This combined solution allows data protection to persist as data moves from storage to in-flight to in-use without requiring changes to downstream applications. View webinar.
How to Get Started with a Seamless Application Security Program – Learn more about the current state of software and application security, how to create or improve your AppSec program in a day, why integration is essential for speed, and why it is essential to go beyond the OWASP Top 10. Register Now.
The state of IoT security: OWASP Top Ten highlights challenges
OWASP's new Top Ten list of IoT Vulnerabilities highlights continuing challenges. Here's the state of IoT security—and what to expect in 2019… Read more
Don’t let ransomware ruin your business
Everyone has heard of WannaCry and NotPetya, two of the most devastating ransomware attacks in history. But why were these attacks so devastating? See our new endpoint management blog for answers… Read more.
Ensuring Endpoint Governance for today’s digital workspaces
There are five steps IT teams need to go through to enable a digital workspace for users, all of which have to be done under the umbrella of endpoint governance… Read more.
Whitelisting, blacklisting, and your security strategy: It's not either-or
Here's what you need to know about whitelisting and blacklisting, with an explainer for which approach might best complement your security strategy… Read more.
Making your application security program seamless
Success with Seamless Application Security takes time and effort, but the biggest hurdle to overcome is the culture change needed to include security throughout the entire software development lifecycle… Read more
Security Progress: One Step at a Time
In this Innovation in Government article by Carasoft, Micro Focus Government Solutions' Rob Roy discusses how modernization shines a light on alternatives to all-or-nothing approaches to encryption and cyber strategies… Read more
Seamless Application Security: Security at the Speed of DevOps
Application development at DevOps speed doesn’t mean sacrificing security and putting your business at risk. Learn how Fortify helps you keep up with the business demands for rapid development with seamless application security. Watch Video.
Micro Focus solutions support an ambitious digital transformation project to deliver both continuous innovation and legislation compliance. Read Case Study.
A Single Global Privacy Framework for Risk Reduction & Value Creation
Discover and classify sensitive data to manage risk, protect data and enforce identity-based access for applications and users, and comply with privacy mandates with confidence and trust. Read White Paper.
TDWI Insight Accelerator | Protecting, Securing, and Governing Data in Analytics Workflows
One issue could bring analytics in your organization to a halt: the inability to properly secure, protect, and govern sensitive data. Read this new report from TDWI Research to learn how to keep your data secure. Read Report.
PCI Technical Assessment for Voltage SecureData Web
Respected QSA Coalfire describes the Voltage SecureData Web solution and the particular requirements it addresses within PCI Data Security Standard (DSS) scope; the solution is designed to increase the security of e-commerce platforms without impacting the buyer experience, and reduce merchant PCI scope. Read White Paper.
A Developer’s Guide to the OWASP Top 10 – 2017
This guide provides an overview of each 2017 OWASP Top 10 application security risks and practical tips for writing secure code. It also provides sample code snippets and easy-to-follow remediation guidance to help you improve the security of your applications. Read Guide.
Click HERE to learn more about Security Events & Announcements