HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

What does being "Certified" mean, anyway?

security education.jpgI read an article recently about a five-year-old boy that passed a Microsoft exam. He's the youngest Microsoft Certified Professional (MCP) ever. I must admit that I was a bit skeptical when I read this; but, it's true. My next reaction was to think about what that means to the industry. There are already plenty of people who frown upon certifications...and it begs the question: What does being "Certified" mean, anyway? 

Labels: education

Known Issues Plague Threat Landscape

The HP Cyber Risk Report is published annually by HP Security Research, leveraging a number of internal and external sources to identify, research and analyze the findings, including the HP Zero Day Initiative, HP Fortify on Demand security assessments, HP Software Security Research and ReversingLabs.

HP gets serious about end-to-end data protection

albert.jpgHP is fully committed to the Voltage portfolio and is excited to enhance these product families with other powerful HP technologies as we make them widely available and supported globally. 

Labels: Atalla

Is your car safe from hackers?

car-flying-off-cliff-public-domain.jpgFrom wifi to remote shutdown capabilities, cars are more connected than ever before. If there is one constant in security, though,  it’s that the introduction of new technologies invariably creates unintended consequences. In automobiles that are also rolling networks, those consequences now include a vulnerability to hacking. So how hackable are cars? According to a recent Senate report that blasted the automobile industry, very. Is your car vulnerable? Read the article for more information.

8 tracks for Government IT professionals--at HP Software Government Summit 2015

lincoln.jpgJoin us for the HP Software Government Summit in Washington, D.C. on April 7, 2015!  Eight tracks provide valuable learning opportunities in pivotal areas for government IT professionals.

Why is your SOC stuck in a rut?

SOC Maturity over time.pngThere’s a definite pattern of cyber defense maturity. Curly Henry, Managing Principle of HP’s Security Intelligence and Operations Consulting Practice, sits down with this blogger to explain.

Love is in the air! So is pollen and this month’s Microsoft bulletins

security-hearts.jpgWe’re getting close to Valentine’s Day and just like clockwork, love is in the air…and so are the February Microsoft bulletins. HP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on February 10, 2015.

Labels: TippingPoint

The top 5 driving forces behind medical data breaches

med data.jpgI recently predicted that the average number of medical records exposed a day in 2015 would surpass 30,000. It’s barely February, and that number has already been smashed for the year. Health insurer Anthem was just hit with what will likely turn out to be the largest data breach ever suffered by a single health care organization as roughly 80 million medical records were exposed. Unfortunately, that’s just one further symptom indicating the health care industry is suffering from a sustained cyber assault. In fact, of the 720 major data breaches that occurred in 2014, 42 percent impacted health care organizations. So why is the healthcare industry under such constant threat? Read the article to see the top five driving forces behind why the healthcare industry is entrenched in the crosshairs.

Welcoming Voltage Security to the HP Atalla Portfolio

atalla.pngVoltage’s powerful data-centric protection solutions will join HP Atalla--expanding HP’s offerings in data classification, payments security, encryption, tokenization and enterprise key management.

Labels: Atalla

HPSR and HP TippingPoint partner to protect customers from bypass techniques

zdi square.pngHP is proud to announce that three members of HP Security Research’s Zero Day Initiative team (ZDI) received Microsoft’s highest honors for their critical research on browser mitigations, with a total payout of $125,000.  Learn more about this honor, and how the winnings will support STEM education, in this blog post. 

Labels: TippingPoint

How to talk to a female in InfoSec

boardroom.jpgInformation Security” is a male-dominated field—but I promise you, there ARE females out there! Read on to find out how to approach your female security colleagues. 

HP TippingPoint DVLabs threat assessment--Ghost

ghost.jpgThere's a scary malware out there--Ghost! Read to see how the DVLabs team detected and mitigated the Ghost vulnerability. 

Labels: TippingPoint

The effect of management turnover in your SOC

riskdial.jpgWhen leadership changes, it’s often for the better. However, the State of Security Operations 2015 report shows that these changes can often stall or cripple cyber defense capabilities and effectiveness. Read this blog to learn more.

The most important security story of the past year...and you probably missed it

What was the most important security story of 2014? Was it the data breaches at Sony or Target, or the mass susceptibility of web sites to Heartbleed and Shellshock? Ultimately, there was another incident in 2014 that received little publicity (at least outside of the security community) which might eventually turn out to be far more important than any of those. It was a highly targeted attack that caused physical damage in the real world, all the result of a single click. Yet, coverage was scant, at best. So what was this attack? How did it occur? Read the article for more information.

HP Security: Working hard to keep creativity free

IceSculpture_Twitter.jpgRecent cyber attacks highlight the need to protect the entertainment industry--join HP at the 37th annual Sundance Film Festival, where you can learn how HP Security is working hard to make the media and entertainment industry safer! 

HP TippingPoint provides protection for the first Microsoft bulletins of 2015

small.jpgHappy New Year! It’s time for fresh starts, new resolutions and the first Microsoft “Update Tuesday” of the year! HP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on January 13, 2015.

Why US banks are choosing fraud analytics over PINs for chip enabled credit cards

cp.jpgPlease join us for this guest post as cryptography and payments security expert Susan Langford, PhD discusses the rationale behind why many US banks are choosing to utilize fraud analytics instead of PINs when new chip enabled credit cards debut later this year.

Top 10 Security Predictions for 2015

2015-Cyber-Security-Image.jpgThe new year means one thing in information security…predictions and prognostication. Here’s my take on what I see happening in information security this year.

5 biggest data breaches of 2014

2014 data breaches.GIFAs we welcome 2015 with new resolution and goals, let us take a moment to remember 2014 and see what were the biggest data breaches. Some of them were attacked as early as 2013, but this was the impact in 2014.


The top 5 data breaxches were:

  1. Adobe : 152 million records stolen
  2. eBay: 145 million records stolen
  3. JP Morgan Chase: 76 million records stolen
  4. Target: 70 million records stolen
  5. Home Depot: 56 million records stolen

Sony Pictures Hack: Is this an introduction to a whole new world in InfoSec? …Nah!

hacker.jpgThe big news in the media and the enterprise security over the past few weeks has been the cyberattack of Sony Pictures. As of the writing of this blog, the movie has been pulled from theaters and a nation state is believed to be behind the attack.


After reading media coverage of the attack, I see similarities between this attack and previous ones. Keep reading to see why I personally don’t think this is the signal of a whole new world of InfoSec.

Network Security: No need to drop, cover, and hold on

earthquake crack.jpgJust like earthquakes in the Silicon Valley, when it comes to advanced threats and targeted attacks it is not a matter of if it will happen, but rather when.  Are you prepared?  How are you going to neutralize patient zero?

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.