Everything you need to know about Heartbleed

The Heartbleed bug has been topping technology news searches this week, and you need answers. What’s the real vulnerability here—passwords or certificates? How should my IT shop respond? Is open source doomed? Fortunately, there’s been a lot of great coverage in the HP Software blogosphere. Whether you’re a CIO, CISO or IT worker in the trenches, these posts and videos will arm you with what you need to know about Heartbleed.

 

Heartache, heartburn or heart attack? In episode 12 of Discover Performance Weekly, HP Software Evangelist Paul Muller talks with Jacob West, CTO of HP Enterprise Security Products. Together, they tackle these aspects of the bug:

 

  • How big of a threat is Heartbleed?
  • Initial steps for Heartbleed triage
  • How hard is it to fix?
  • What exactly is Heartbleed?
  • What questions should CIOs and CISOs be asking?

Get answers to those questions and more by watching “Heartbleed bug: How worried should you be?”

 

In a new Google Hangout, Joy Forsythe of HP Security Research joins Joanna Burkey of HP TippingPoint DVLabs to discuss the origins of the Heartbleed bug. Joy tracks down the cause of the bug, while Joanna demystifies new terminology and acronyms associated with the Heartbleed bug, and explains how HP Fortify and HP TippingPoint were able to quickly protect customers. To learn more about Heartbleed—including how static analysis might have kept it from getting into the wild—watch “Heartbleed: Joy and Joanna stop the bleeding.”

 

On the Fortify - Application Security blog, HP Software Principal Security Architect Daniel Miessler offers “Thoughts on the Heartbleed Bug,” including what the bug is, implications, analysis, commentary and further reading.

 

Finally, HP’s Mark Painter offers reassurance in “HP Enterprise Security Products handles Heartbleed.” In his post on the HP Security Products blog, he explains how key groups at the company have put forth a solution or method of detection that let organizations know how to assess where they stand.

 

For more insightful articles about security and critical trends in enterprise software, sign up for the Discover Performance e-newsletter.

Labels: security
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author
Alec Wagner is a longtime writer & editor, enterprise IT insider, and (generally) fearless digital nomad.


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation