HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Enterprise security: What’s new for the week of November 17, 2014

entsec news_small.jpgHere’s what new in Security Intelligence & Zero-Day Coverage for HP TippingPoint for the week of November 17th.

Labels: TippingPoint

HP TippingPoint--Vulnerability research stats, October 2014

Each week, the TippingPoint DVLabs team develops new attack filters to address vulnerabilities and incorporates these filters into Digital Vaccines. Every last Thursday of the month, we release a blog showing these advisory updates.

Labels: TippingPoint

Enterprise security: What’s new for the week of October 20 2014

entsec news_small.jpgWhat happened this week in HP Enterprise Security? Find out here: What's new in Security Intelligence & Zero-Day Coverage for HP TippingPoint for the week of October 20th. 

Labels: TippingPoint

Down, but not out for the count...Alina fights on

worm hacker.jpgOn October 5th, a Russian hacker going by the handle ‘w0rm’ claimed that he had compromised Subway’s servers and discovered Point-Of-Sale malware. Subway has not confirmed this breach; if this story is accurate, HP TippingPoint could have been essential in averting the exfiltration of data from infected systems.

 

Guest post by 

Mat Powell

Security Researcher, HP DVLabs

Labels: TippingPoint

HP TippingPoint customers protected from SSL 3.0 “POODLE” on day one


The SSL 3.0 POODLE vulnerability isn't so vicious if you're an HP TippingPoint customer. Here's how we're making every second matter... 

 

Guest post by 
Elisa Lippincott
Product Marketing Manager

Labels: TippingPoint

It's National Cyber Security Awareness month--Here's a treat from HP Enterprise Security

trick or treat.jpgFor many of us in the U.S., October means the changing of the leaves, pumpkin-flavored lattes, and candy…lots and lots of candy. But October is also a big month for network security, as it’s Cyber Security Awareness Month.

Labels: TippingPoint

What is the cost of cyber crime? Looking past the headlines.

larry.pngDr. Larry Ponemon says the headlines don’t tell the whole story about cyber crime. The Ponemon Institute just completed their fifth annual study on the cost of cyber crime to businesses around the world. And some of the most useful results are among the less obvious. 

 

A guest post by

Dr. Larry Ponemon
Chairman and Founder of the Ponemon Institute

Labels: TippingPoint

Shellshock: HP Security handles the aftershocks

shellshock.jpgMembers of HP Security Research and the HP TippingPoint DVLabs team discuss the GNU Bash vulnerability “Shellshock” and how we were able to quickly protect customers.

Labels: TippingPoint

GNU Bash vulnerability "Shellshock" (CVE-2014-6271): HP TippingPoint update

hacked 2.jpgThere's a new bug out there, and it could pose a larger threat than "Heartbleed." Unless, of course, you're an HP TippingPoint customer! Read this blog for HP TippingPoint's response to CVE-2014-6271.

Labels: TippingPoint

HP TippingPoint--Leading vulnerability research stats

Each week, the TippingPoint DVLabs team develops new attack filters to address vulnerabilities and incorporates these filters into Digital Vaccines. Here are the advisory numbers for 2006-present, in comparison to other organizations. 

Labels: TippingPoint

Interop NY is around the corner--TippingPoint will be there--will you?

interop.jpgInterop NY is right around the corner, and HP TippingPoint can’t wait! We’re having a launch celebration, and you’re invited—read this blog for more info.

 

A guest post by
Elisa Lippincott
HP Enterprise Security Products
Marketing Manager

Labels: TippingPoint

Loyola University Chicago leverages HP TippingPoint Geo-Filtering feature

devices.jpgHow do you manage network security for approximately 72,000 devices? HP TippingPoint talked with Brett Weston, Information Security Administrator for Loyola University Chicago, to see how he does it. 

Labels: TippingPoint

Stop cyberattacks before the damage is done with HP TippingPoint NGIPS

The damage from a cyberattack is often done before you even realize it has happened. Stop cyberattacks before they begin with HP TippingPoint NGIPS. Get a free cyber security value assessment here.

Labels: TippingPoint

Don't miss the Bad Guy Lair at HP Protect!

credit-cards-security_coll.jpgWant to see how credit card breaches happen? How the Internet of Things gets hacked, or how your mobile device can be compromised? Then head over to the Bad Guy Lair at HP Protect. We aren't the bad guys, but we'll show you how to think like one. 

Stop that exploit with HP TippingPoint Next-Generation Intrusion Prevention System

wild_west.jpgBad guys lurking in the shadows, vulnerabilities around every corner, and it’s a quick-draw on whether or not an exploit gets through—did you stop it in time? Sometimes, your network security feels like the wild west. The good news? You’ve got the good guys on your side with HP TippingPoint.

Labels: TippingPoint
Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.