HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Displaying articles for: February 2014

Trojan Horse Worked Against the Greeks, but it Cannot Work Against HP TippingPoint

Whether you are running an HP TippingPoint IPS or NGFW, the TippingPoint IPS is always at work for you. In this specific th.jpgcase, security intelligence was used to validate the threat and protect the retailer from a devastating breach.  Don’t let your organization be a modern day Troy!

HP announces HP Fortify Open Review Project at RSA 2014 Conference

Open-Source-Software6.jpgAs part of the  effort to share threat intelligence and give organizations the proper tools for security success,  HP announced the HP Fortify Open Review Project at RSA 2014 this week.  This initiative provides an in-depth source of security intelligence to both identify and report on security vulnerabilities in widely used open-source software components. Best of all, we're offering this service for free.  For more information, read the full article.

Learn to think like a bad guy...one mission at a time

Are you BAD enough to be GOOD? Join us in the hunt at this year's RSA Conference. Prizes, fame, and notoriety are yours for the taking...

Labels: HP| RSA| security

The HP Security Research group details Iranian cyber capabilities

cybarwar.jpgThe HP Security Research group (HPSR) has done some incredible work in detailing the cyber capabilities of Iran. It’s fascinating stuff.  Cyber warfare is simply the best way for smaller nations or groups with a malevolent agenda who could never compete with  a superpower military to level the playing field.  And while Iran might not have the tanks and aircraft to match the western world, they definitely have the keyboards. Read the full article for more information.

Why the healthcare industry needs a new security prescription

medicalnegligenceimage.jpgThink of the information you're asked to provide when you visit any doctor, dentist, or specialist, and it's easy to see how healthcare information is the hacker's mother lode. Social Security numbers, credit card information, dates of birth, medical histories, and on and on.  So what's the current status of healthcare industry security? Under the weather, and then some. Read the rest of the article for more information.

Thinking like a 'bad guy' at RSA 2014 with HP Threat Central

threat central.jpgIt's a new year, and one of our resolutions is to help our customers rethink their security strategy. Keep reading to learn more.


3 potential issues with the new Cybersecurity Framework

congr.jpgThe White House just released a  Cybersecurity Framework developed by the National Institute of Standards and Technology designed to help critical industries both secure their networks and recover from successful breaches. While a move in the right direction, there are some foreseeable issues with the guidelines. Read the rest of the article for more information.

Important Questions for Big Security Data

hp-HAVEn.jpgHAVEn is a big data toolbox; however, it’s what you can use it for that actually matters. This post asks a number of questions about how you can use big data to answer security questions that were never possible before. Using data to answer security questions instead of anecdotes is an important step forward for our industry. 

Bitcoins, black market, and Information Security

bitcoin.jpgThe outcome of a good security measure is compliance, safe and secured network. When you are obsessed with extreme security and privacy, the outcome may lead to illegal activities. The Bitcoin came into existance for a good cause. It was designed and licensed at MIT, Boston to overcome limitation of centralized currency. It started as a currency protocol and regulators are hoping that it would used only for legal activities.

 

Online black market sites are feeling extremely vulnerable because the closure of the two main competitors Black Market Reloaded and Sheep Marketplace by authorities.

HP releases 2013 Cyber Risk Report

risk report cover.PNGEarlier this week the HP 2013 Cyber Risk Report was released. So far, it's been covered in featured articles in the Wall Street Journal, Bloomberg Business Week, and SC Magazine, to name but a few. In other words, it's kind of a big deal. So why is it so important? Read the article to find out and to download a full copy of the report.

Security in the form of... a pizza box

"ShapeShifter"--have you heard about it? It's a new device that was developed to help stump hackers. Read more in this blog!

Labels: HP| RSA| security

Target-style Breaches—Change your security response time from months to minutes

target.jpg

The average response time to a serious threat incident is currently counted in months. Learn how to utilize HP ArcSight, coupled with CO3 Systems, to change your response time to minutes.

 

Tags: ArcSight| HP| security
Labels: HP| security

3 biggest Super Bowl XLVIII security gaffes

tix.jpgHigh profile events such as the Super Bowl require intense levels of security. However, for what should have been the most secure sporting event in history, there were some astounding security lapses.  Read the full article for information concerning the top 3 security gaffes at this year's Super Bowl, and how Denver's offensive woes might be more like your network security than you think.

5 MORE reasons why Security Operations Organizations are ineffective

 The State of Security Operations 2014 report shared observations of global security organizations’ success and failures. The announcement blog discussed the top 5 mistakes these organizations are making.  Read on to see an additional 5 mistakes…

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
Top Kudoed Posts
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.