HP Security Research Blog
The HP Security Research blog provides a platform for security experts from across HP to discuss innovative research, industry observations, and updates on the threat landscape to help organizations proactively identify and manage risk.

Infographic: HP Security Research Cyber Risk Report 2015

very teeny tiny chart.pngThe annual Cyber Risk Report from HP Security Research provides organizations with a better understanding of the threat landscape and supplies resources that can aid in minimizing security risk. This year, we’re including an infographic detailing some of the more interesting data points detailed in the report.

Introducing Cyber Risk Report 2015

crr2015-cover-snip.PNGThe entire HP Security Research team is pleased to announce the release of our annual Cyber Risk Report, a recap of what mattered in 2014 and where we believe the infosecurity world is heading in 2015.

Just another day at the office: A ZDI analyst’s perspective on ZDI-15-030

zdi-small.pngA vulnerability report received late last year by the Zero Day Initiative contained a particularly well-written and well-documented example of a Windows kernel issue. Let’s take a walk through ZDI-15-030.

Life after Windows Server 2003: Ready or not, here it comes

The impending end of support for Microsoft’s 11-year-old operating system should have businesses formulating a plan for their remaining Windows Server 2003 deployments. We look at what will and won’t happen on July 14, 2015 and how to think about what comes next.

Changes to Zero Day Initiative program benefits

zdi-small.pngAs the Zero Day Initiative looks forward to 2015, changes are coming to our program benefits. They’re designed to encourage new researchers and further reward our frequent submitters.

Search
Showing results for 
Search instead for 
Do you mean 
About the Author(s)
HP Blog

HP Software Solutions Blog

Featured


Follow Us
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.