Please turn on your JavaScript for this page to function normally.
architecture
Majority of SOCs are below optimal maturity levels

With increased pressure to rapidly innovate and align security initiatives with business goals, a SOC provides the foundation for how organizations protect their most …

Businessman juggling
Business strategy and innovation framework for the industrial IoT

The Industrial Internet Consortium (IIC), the global, member-supported organization that promotes the accelerated growth of the Industrial Internet of Things (IIoT), announced …

Binary
68% of organizations don’t have an IoT test strategy

Capgemini and HPE examined the state of application quality and testing practices across multiple industries and 32 countries. They discovered that, despite 85% claiming that …

MicroFocus
Micro Focus merger with HPE’s Software Business Segment worth $8.8 billion

Micro Focus announced today its intent to merge with HPE’s Software Business Segment in a transaction valued at approximately $8.8 billion. The merger is subject to …

dollar
Cybercrime economy: The business of hacking

The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years. Adversaries are …

HP
Critical flaws in HP Data Protector open servers to remote attacks

Hewlett Packard has released critical security updates for its HP Data Protector software, which fix vulnerabilities that could allow remote code execution or unauthorized …

money
Fighting malware monetization and application vulnerabilities

As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …

HP
Is your HP enterprise printer hosting malware for hackers?

“If you’re concerned about security, put your printers are behind a firewall and, if it’s a Hewlett-Packard, make sure port 9100 isn’t open,” says security …

The average cost of cybercrime escalates to $15 million per organization

A new study by the the Ponemon Institute and HP reveales a dramatic increase in the overall cost of cyber crime. The 2015 Cost of Cyber Crime Study quantifies the annual cost …

HP releases exploit code for IE zero-day that Microsoft won’t patch

Despite having paid $125,000 for information about an Address Space Layout Randomisation (ASLR) vulnerability affecting Internet Explorer, Microsoft has decided against …

Known weaknesses plague the security threat landscape

Well-known issues and misconfigurations contributed to the most formidable threats in 2014, according to HP Security Research. “Many of the biggest security risks are …

HP to revoke certificate that was used to signed malware

HP has announced to its customers that it will soon revoke a specific private digital certificate that they used to sign some software components that ship with some of its …

Don't miss

Cybersecurity news