HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

Network Security: No need to drop, cover, and hold on

earthquake crack.jpgJust like earthquakes in the Silicon Valley, when it comes to advanced threats and targeted attacks it is not a matter of if it will happen, but rather when.  Are you prepared?  How are you going to neutralize patient zero?

HP TippingPoint provides protection for new Microsoft bulletins - December 2014




This month, Microsoft released seven update bundles to fix two dozen security vulnerabilities in Windows and supported software. Our latest Digital Vaccine package includes coverage for the Microsoft Security Bulletins released on December 9, 2014...

HP TippingPoint protects against Regin

Malware-icon.pngThere's a nasty piece of malware out there--Regin. Don't worry...HP TippingPoint's got you covered! Read this blog post to learn how the TippingPoint DVLabs team used security intelligence to detect and mitigate the Regin malware.


Guest post by Jennifer Ellard
Director, Product Marketing, HP TippingPoint

Labels: DVLabs| TippingPoint

Gain cybersecurity survivability

header-web-app-security.jpgWhen it comes to building and designing more secure and resilient applications, you should build it right and develop it right. Period. 

Labels: security

Network security from a cybercriminal's perspective

frank interview.jpgTo stop cybercrime, you have to think about security from the cybercriminal's perspective. Join Frank Mong as he discusses this very topic from HP Discover in Barcelona. 

Labels: security

Enhanced correlation and threat detection with HP ArcSight

siem_2.jpgHP announces a new version of its market-leading SIEM solution, HP ArcSight ESM!  

Tags: siem
Labels: ArcSight ESM

HP DVLabs threat assessment

T-consumer-card-svcs__153x115--C-tcm245-1132536-CT-tcm245-1237012-32.jpgRetail Point-of-Sale malware doesn’t get past HP TippingPoint!


Guest post by Jennifer Ellard
Director, Product Marketing, HP TippingPoint

Labels: DVLabs| TippingPoint

Enterprise security: What’s new for the week of November 17, 2014

entsec news_small.jpgHere’s what new in Security Intelligence & Zero-Day Coverage for HP TippingPoint for the week of November 17th.

Labels: TippingPoint

Why does your CISO care about Ebola?

ebola.pngOutsourcing, catastrophic risk, Ebola, poodles? Read on to see what these topics have to do with your CISO and why you should thank yours today.

Top 10 ways consumers can protect themselves during the holiday shopping season

Grinch%20who%20stole%20Christmas.jpgThe spate of high profile data breaches this year has pushed security into the public consciousness like never before. Although that awareness has risen from bad circumstances, overall that increase is a good thing. What it’s not been coupled with is a way for consumers to alleviate some of their concerns, especially when data breaches have become sensationalized to the point where Americans fear identity theft more than being shot. There are some simple measures consumers can take to protect themselves during the holiday shopping season. Read the article for the Top 10.

Think like a bad guy. Then outthink him.

bgl_person.jpgIt's time to understand the enemy. Visit the HP Virtual Bad Guy Lair to begin. 

Secure your network with HP TippingPoint

network with lock.jpgYou’ve heard it over and over by now: The threat landscape is changing. It’s ever-evolving, and the threats are now more serious and more widespread than they have ever been.  So, what does this mean for your network?

Labels: HP Discover| IPS| NGFW

HP Atalla Announces Support for Securing New Cloud-based Electronic Payments

atalla.PNGSecurity has seeped into the public consciousness like never before due to a rash of recent high profile credit card data breaches (Target, Home Depot, and on and on). Couple that with sheer convenience, and it’s no surprise that consumers have quickly embraced new methods of electronic payments like Apple Pay and e-wallets. However, this rapid adoption hasn’t come without significant security concerns. How, then, can organiztions protect themselves and their customer data? Read the article for more information.

HP TippingPoint + Mobile Pwn2Own = Zero Day Filter Protection

new pwn2own.jpgHas it been a year already?  We're back and coming at you from Tokyo, Japan with another round of Mobile Pwn2Own.  


Guest post by 
Steve Povolny


Security Podcast: The security implications of the Internet of Things

IoT.jpgEvery day, more and more objects from thermostats to pacemakers gain network connectivity, allowing them to send and receive data. Collectively, these devices are referred to as the Internet of Things. By 2020, Gartner predicts the Internet of Things will grow to include 26 billion “units." But as we’ve already seen with web applications and mobile devices, new technology invariably comes with hidden security costs. Join us for this podcast as we discuss the security implications of the Internet of Things, the dangers this presents to organizations and consumers alike, and what each can do to protect themselves. To listen to this episode, read the article.

Cyber cold war heats up

images.jpgThe Washington Post recently reported that the White House non-classified network was by all indications compromised by Russian hackers. There have been simmering cyber tensions between the United States and other nations for years, but things are starting to escalate for a variety of reasons. Read the article for more information.

Fraudulent chip cards--if you don't check the cryptogram, NO protocol is secure

credit-cards-security_coll.jpgA recent bout of credit card fraud shows charges submitted through the networks as chip-enabled transactions—even though the banks that issued the cards have yet to send customers chip-enabled cards.  Susan Langford, HP Security, Atalla, explains how this can happen. 

Labels: Atalla

The Security Analyst Skills Gap - Part 3

“I’m afraid that if I spend my time training security analysts then they will just qretention.jpguit and go work for my competitor for more money.” Sound Familiar? Finding good security analysts is difficult. Keeping good security analysts is even harder. Read on to see how HP works with organizations to help retain security analysts.

HP TippingPoint--Vulnerability research stats, October 2014

Each week, the TippingPoint DVLabs team develops new attack filters to address vulnerabilities and incorporates these filters into Digital Vaccines. Every last Thursday of the month, we release a blog showing these advisory updates.

Labels: TippingPoint

Expand your security knowledge in Barcelona

discover large.jpgHP Discover kicks off the first week of December in Barcelona, Spain! HP Enterprise Security Products will be there—ready to give you the scoop on what you can do to beat the adversaries at their own game.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.