HP Security Products Blog
From applications to infrastructure, enterprises and governments alike face a constant barrage of digital attacks designed to steal data, cripple networks, damage brands, and perform a host of other malicious intents. HP Enterprise Security Products offers products and services that help organizations meet the security demands of a rapidly changing and more dangerous world. HP ESP enables businesses and institutions to take a proactive approach to security that integrates information correlation, deep application analysis and network-level defense mechanisms—unifying the components of a complete security program and reducing risk across your enterprise. In this blog, we will announce the latest offerings from HP ESP, discuss current trends in vulnerability research and technology, reveal new HP ESP security initiatives and promote our upcoming appearances and speaking engagements.

The most important security story of the past year...and you probably missed it

What was the most important security story of 2014? Was it the data breaches at Sony or Target, or the mass susceptibility of web sites to Heartbleed and Shellshock? Ultimately, there was another incident in 2014 that received little publicity (at least outside of the security community) which might eventually turn out to be far more important than any of those. It was a highly targeted attack that caused physical damage in the real world, all the result of a single click. Yet, coverage was scant, at best. So what was this attack? How did it occur? Read the article for more information.

HP Security: Working hard to keep creativity free

IceSculpture_Twitter.jpgRecent cyber attacks highlight the need to protect the entertainment industry--join HP at the 37th annual Sundance Film Festival, where you can learn how HP Security is working hard to make the media and entertainment industry safer! 

HP TippingPoint provides protection for the first Microsoft bulletins of 2015

small.jpgHappy New Year! It’s time for fresh starts, new resolutions and the first Microsoft “Update Tuesday” of the year! HP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on January 13, 2015.

Why US banks are choosing fraud analytics over PINs for chip enabled credit cards

cp.jpgPlease join us for this guest post as cryptography and payments security expert Susan Langford, PhD discusses the rationale behind why many US banks are choosing to utilize fraud analytics instead of PINs when new chip enabled credit cards debut later this year.

Top 10 Security Predictions for 2015

2015-Cyber-Security-Image.jpgThe new year means one thing in information security…predictions and prognostication. Here’s my take on what I see happening in information security this year.

5 biggest data breaches of 2014

2014 data breaches.GIFAs we welcome 2015 with new resolution and goals, let us take a moment to remember 2014 and see what were the biggest data breaches. Some of them were attacked as early as 2013, but this was the impact in 2014.


The top 5 data breaxches were:

  1. Adobe : 152 million records stolen
  2. eBay: 145 million records stolen
  3. JP Morgan Chase: 76 million records stolen
  4. Target: 70 million records stolen
  5. Home Depot: 56 million records stolen

Sony Pictures Hack: Is this an introduction to a whole new world in InfoSec? …Nah!

hacker.jpgThe big news in the media and the enterprise security over the past few weeks has been the cyberattack of Sony Pictures. As of the writing of this blog, the movie has been pulled from theaters and a nation state is believed to be behind the attack.


After reading media coverage of the attack, I see similarities between this attack and previous ones. Keep reading to see why I personally don’t think this is the signal of a whole new world of InfoSec.

Network Security: No need to drop, cover, and hold on

earthquake crack.jpgJust like earthquakes in the Silicon Valley, when it comes to advanced threats and targeted attacks it is not a matter of if it will happen, but rather when.  Are you prepared?  How are you going to neutralize patient zero?

HP TippingPoint provides protection for new Microsoft bulletins - December 2014




This month, Microsoft released seven update bundles to fix two dozen security vulnerabilities in Windows and supported software. Our latest Digital Vaccine package includes coverage for the Microsoft Security Bulletins released on December 9, 2014...

HP TippingPoint protects against Regin

Malware-icon.pngThere's a nasty piece of malware out there--Regin. Don't worry...HP TippingPoint's got you covered! Read this blog post to learn how the TippingPoint DVLabs team used security intelligence to detect and mitigate the Regin malware.


Guest post by Jennifer Ellard
Director, Product Marketing, HP TippingPoint

Labels: DVLabs| TippingPoint

Network security from a cybercriminal's perspective

frank interview.jpgTo stop cybercrime, you have to think about security from the cybercriminal's perspective. Join Frank Mong as he discusses this very topic from HP Discover in Barcelona. 

Labels: security

Enhanced correlation and threat detection with HP ArcSight

siem_2.jpgHP announces a new version of its market-leading SIEM solution, HP ArcSight ESM!  

Tags: siem
Labels: ArcSight ESM

HP DVLabs threat assessment

T-consumer-card-svcs__153x115--C-tcm245-1132536-CT-tcm245-1237012-32.jpgRetail Point-of-Sale malware doesn’t get past HP TippingPoint!


Guest post by Jennifer Ellard
Director, Product Marketing, HP TippingPoint

Labels: DVLabs| TippingPoint

Enterprise security: What’s new for the week of November 17, 2014

entsec news_small.jpgHere’s what new in Security Intelligence & Zero-Day Coverage for HP TippingPoint for the week of November 17th.

Labels: TippingPoint

Why does your CISO care about Ebola?

ebola.pngOutsourcing, catastrophic risk, Ebola, poodles? Read on to see what these topics have to do with your CISO and why you should thank yours today.

Top 10 ways consumers can protect themselves during the holiday shopping season

Grinch%20who%20stole%20Christmas.jpgThe spate of high profile data breaches this year has pushed security into the public consciousness like never before. Although that awareness has risen from bad circumstances, overall that increase is a good thing. What it’s not been coupled with is a way for consumers to alleviate some of their concerns, especially when data breaches have become sensationalized to the point where Americans fear identity theft more than being shot. There are some simple measures consumers can take to protect themselves during the holiday shopping season. Read the article for the Top 10.

Secure your network with HP TippingPoint

network with lock.jpgYou’ve heard it over and over by now: The threat landscape is changing. It’s ever-evolving, and the threats are now more serious and more widespread than they have ever been.  So, what does this mean for your network?

Labels: HP Discover| IPS| NGFW

HP Atalla Announces Support for Securing New Cloud-based Electronic Payments

atalla.PNGSecurity has seeped into the public consciousness like never before due to a rash of recent high profile credit card data breaches (Target, Home Depot, and on and on). Couple that with sheer convenience, and it’s no surprise that consumers have quickly embraced new methods of electronic payments like Apple Pay and e-wallets. However, this rapid adoption hasn’t come without significant security concerns. How, then, can organiztions protect themselves and their customer data? Read the article for more information.

HP TippingPoint + Mobile Pwn2Own = Zero Day Filter Protection

new pwn2own.jpgHas it been a year already?  We're back and coming at you from Tokyo, Japan with another round of Mobile Pwn2Own.  


Guest post by 
Steve Povolny


Security Podcast: The security implications of the Internet of Things

IoT.jpgEvery day, more and more objects from thermostats to pacemakers gain network connectivity, allowing them to send and receive data. Collectively, these devices are referred to as the Internet of Things. By 2020, Gartner predicts the Internet of Things will grow to include 26 billion “units." But as we’ve already seen with web applications and mobile devices, new technology invariably comes with hidden security costs. Join us for this podcast as we discuss the security implications of the Internet of Things, the dangers this presents to organizations and consumers alike, and what each can do to protect themselves. To listen to this episode, read the article.

Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.