HP helps organizations define a security strategy
HP announced a new set of security services that help organizations respond to, remediate and mitigate the impact of security breaches as they occur. Security breaches are …
HP introduces intelligent security solutions
HP announced additions to its security solutions portfolio that enable enterprises to assess, transform, optimize and manage their security environments. Cloud, mobility and …
HP secures the mobile workforce
HP announced new offerings to help SMBs prepare their technology infrastructures for a growing mobile workforce. With more than 1.1 billion mobile appliances in use worldwide, …
HP identifies the sophistication of security attacks
HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …
The current challenges of being a CISO
In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …
Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks
Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …
HP expands its Enterprise Security Solutions portfolio
HP expanded its Enterprise Security Solutions portfolio to help enterprises establish and execute a comprehensive security strategy to deal with threats resulting from the …
HP Intelligent Management Center multiple vulnerabilities
Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …
New HP application security solutions
HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …
Application security vulnerabilities
Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …
Top cybercrime weapon: Web exploit toolkits
HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …