Logo
02.07.2015

Produkte

Hang out with HP Security at Black Hat USA

HP Security is headed to Vegas for Black Hat USA. Stop by and see us in booth 411, for a chance to talk shop, and to win some great prizes. ...

lesen...
Logo
01.07.2015

Nachrichten

HPSR Software Security Content 2015 Update 2

HP Software Security Research is pleased to announce the immediate availability of updates to HP Application Defender, HP WebInspect SecureBase (available via SmartUpdate), HP Fortify Secure Coding Rulepacks (English language, version 2015.2.0), and HP Fortify Premium Content. As...

lesen...
Logo
29.06.2015

Produkte

Lateral movement: the key to any attack or escape

Whether you are breaking out of prison or planning the perfect targeted attack you will need to get help from others, knowledge of when and where security is monitoring, a plan of attack, and a lot of luck. See how lateral movement is a key underlying component of each of these a...

lesen...
Logo
27.06.2015

Produkte

Enterprise network security: What’s new for the week of June 22, 2015

Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of June 22, 2015....

lesen...
Logo
26.06.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – June 26, 2015

Welcome to the June 26th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen...
Logo
25.06.2015

Produkte

HP 2015 Cyber Risk Report: Gains by determined adversaries

Welcome to Part 4 of a 7-part series, where will be discussing the key themes of the 2015 HP Cyber Risk Report....

lesen...
Logo
24.06.2015

Produkte

6 ways to screw up a SIEM implementation

Working in a team that regularly tends to client SIEM installations; we do things like we set up a SIEM for the first time, tune a SIEM, and build security operations around a SIEM. Because of the breadth of clients and situations we work in, we have some good insights into what ...

lesen...
Logo
23.06.2015

Artikel

HP: Oberklasse-Notebooks auch mit AMD und ein Atom 2-in-1 für wenig Geld

Die Envy-Baureihe steht bei HP für Consumer-Notebooks mit gehobener Ausstattung. Mit der aktuellen Modellpflege der 15,6- und 17,3-Zoll-Geräte halten nicht nur neue Intel-Broadwell-Prozessoren Einzug, sondern auch AMDs neuer Carrizo-Mobilprozessor. Daneben bringt HP mit dem Pavil...

lesen...
Logo
22.06.2015

Produkte

TippingPoint: A switch hitter for network security

We’re delivering a “switch hitter” for network security with the introduction of the HP TippingPoint Threat Protection System (TPS)… ...

lesen...
Logo
20.06.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – June 19, 2015

Welcome to the June 19th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen...
Logo
19.06.2015

Nachrichten

There and back again: a journey through bounty award and disclosure

In February 2015, HP Zero Day Initiative (ZDI) team members Brian Gorenc, AbdulAziz Hariri, and Simon Zuckerbraun won $125,000 from Microsoft’s mitigation-bypass bug bounty program. Today they’re fully disclosing the details of that bypass. Here’s where – and why....

lesen...
Logo
19.06.2015

Produkte

Enterprise network security: What’s new for the week of June 15, 2015

Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of June 15, 2015....

lesen...
Logo
19.06.2015

Artikel

Neues Business-Tablet von HP mit Windows 10

HP bringt sein erstes Tablet für Unternehmen, das mit dem Betriebssystem Windows 10 ausgeliefert wird. Zudem wurde der HP Touchpoint Manager – eine IT-Management-Lösung für KMU – mit neuen Funktionen ausgestattet.

lesen...
Logo
18.06.2015

Artikel

HP Helion bietet mehr für hybride Infrastrukturen und Managed IT

HP will mit Erweiterungen des „HP-Helion“-Portfolios Unternehmen den Umstieg auf eine hybride Infrastrukturen erleichtern: „HP Helion Cloud System 9.0“ ist die jüngste Version der integrierten Cloud-Anwendung für Unternehmen und die „Helion Managed Cloud Services“ erleichtern es...

lesen...
Logo
15.06.2015

Produkte

Outrunning the bear - 5 critical ways to take a more collaborative approach to security

Companies still rely heavily on fairly traditional methods of data security like password management and acceptable use policies to protect their information from unauthorized access. Unfortunately these traditional approaches to security are no longer enough in the era of the da...

lesen...
Logo
15.06.2015

Produkte

What is a "critical friend" and why do you need one?

Do you have a critical friend? You should. Read on to learn what a critical friend is and how they can contribute to your success....

lesen...
Logo
15.06.2015

Artikel

Big Data-as-a-Service mit Haven OnDemand

Hewlett-Packard (HP) bietet mit der Haven-Plattform eine Hadoop-konforme Big-Data-Lösung in der Cloud. Die Lösung basiert auf Autonomy IDOL, Vertica und ArcSight. Haven stellt damit sozusagen eine Sammlung dieser Lösungen dar und erlaubt die Weiterentwicklung von Big Data in der ...

lesen...
Logo
12.06.2015

Produkte

Enterprise network security: What’s new for the week of June 8, 2015

Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of June 8, 2015....

lesen...
Logo
12.06.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – June 12, 2015

Welcome to the June 12th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen...
Logo
11.06.2015

Artikel

Die Referenzarchitektur für Big Data

Die IT-Abteilung steckt häufig in der Bredouille, wenn Fachabteilungen von ihr eine Big-Data-Lösung einfordern. Meist ist den Beteiligten zu Beginn solcher Projekte nicht klar, für welche zu erwartenden Workloads die Infrastruktur auszurichten ist. Das erschwert die Abwägung zwis...

lesen...
Logo
11.06.2015

Artikel

Die Referenzarchitektur für Big Data

Die IT-Abteilung steckt häufig in der Bredouille, wenn Fachabteilungen von ihr eine Big-Data-Lösung einfordern. Meist ist den Beteiligten zu Beginn solcher Projekte nicht klar, für welche zu erwartenden Workloads die Infrastruktur auszurichten ist. Das erschwert die Abwägung zwis...

lesen...
Logo
10.06.2015

Produkte

3 ways to make big data small data

Big data is overwhelming. Here are 3 ways to make the vast amounts of data smaller and more manageable....

lesen...
Logo
10.06.2015

Produkte

HP TippingPoint provides protection for June 2015 Microsoft bulletins

HP TippingPoint’s Digital Vaccine package includes coverage for the following Microsoft Security Bulletins released on June 9, 2015....

lesen...
Logo
09.06.2015

Artikel

Die Referenzarchitektur für Big Data

Die IT-Abteilung steckt häufig in der Bredouille, wenn Fachabteilungen von ihr eine Big-Data-Lösung einfordern. Meist ist den Beteiligten zu Beginn solcher Projekte nicht klar, für welche zu erwartenden Workloads die Infrastruktur auszurichten ist. Das erschwert die Abwägung zwis...

lesen...
Logo
08.06.2015

Produkte

Enterprise network security: What’s new for the week of June 1, 2015

Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of June 1, 2015....

lesen...
Logo
08.06.2015

Produkte

HP Principles of Software Security seminar

Join us on June 23 or June 25 for a 2.5 hr seminar where we will demonstrate some of our best-in-class software security technologies....

lesen...
Logo
05.06.2015

Produkte

HP 2015 Cyber Risk Report: Newer technologies, new avenues of attack

Welcome to Part 3 of a 7-part series, where will be discussing the key themes of the 2015 HP Cyber Risk Report....

lesen...
Logo
05.06.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – June 5, 2015

Welcome to the June 5th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen...
Logo
04.06.2015

Nachrichten

HP Security Briefing, Episode 22: The hidden dangers of inadequate patching strategies

Installation of security updates should be easy – that’s certainly the theory. In this briefing, we examine industrywide problems with patching and how inadequate servicing approaches hurt everyone....

lesen...
Logo
02.06.2015

Artikel

Hürden für den Einzug neuer Halbleiterspeicher liegen hoch

Flash-Alternativen gibt es inzwischen mehr als zwei Hand voll. Schneller und langlebiger soll sie sein, die nächste Generation der Halbleiterspeicher, so versprechen die Akteure in diesem Feld. Ebenso mit besseren Funktionen aufwarten. Allerdings stehen dem breiten Einzug in die ...

lesen...
Logo
29.05.2015

Produkte

Enterprise network security: What’s new for the week of May 25, 2015

Here’s what new in Threat Intelligence & Zero-Day Coverage for HP TippingPoint for the week of May 25, 2015....

lesen...
Logo
29.05.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – May 29, 2015

Welcome to the May 29th edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen...
Logo
28.05.2015

Produkte

Breaking out of the real world into your network

When it comes to monitoring ports and protocols, are you monitoring all the points of entry to your network?  Like an old school prison break, using the front door is too obvious.  Bad guys today are using multi-vector attack schemes to access your network, targeting we...

lesen...
Logo
28.05.2015

Nachrichten

Oh, behave!: Breaches, APT, and activity monitoring

A recent Gartner survey indicates that an overwhelming majority of breaches are application-related. We look at how that knowledge can be power in the right defenders’ hands....

lesen...
Logo
27.05.2015

Nachrichten

Common Web mistakes that invite trouble

Sometimes it seems as if security folk simply can’t shut off the part of their brain that looks for trouble. Unfortunately, years of questionable web site development tactics have made trouble plenty easy to find. See if any of these misbehaviors ring a bell....

lesen...
Logo
27.05.2015

Produkte

HP Security is Vegas bound!

HP Discover kicks off next week in Las Vegas! Are you ready to expand your cybersecurity horizons? HP Security will be there—ready to give you the details on what you can do to beat the bad guys at their own game. Read this post for a printable list of all security...

lesen...
Logo
26.05.2015

Produkte

HP 2015 Cyber Risk Report: Misconfigurations are still a problem

Welcome to Part 2 of a 7-part series, where will be discussing the key themes of the 2015 HP Cyber Risk Report....

lesen...
Logo
26.05.2015

Artikel

HP: Aus Eins mach Zwei

Ein Konzern splittet sich auf. Operativ sind Hewlett Packard Enterprise und HP Inc. bereits auf eigenen Wegen unterwegs.

lesen...
Logo
23.05.2015

Nachrichten

Adult Friend Finder leak – what can we learn?

The recent breach and data dump of records on 3.8 million Adult Friend Finder subscribers may have provided a certain degree of amusement to the Internet – though it’s safe to say that the subscribers and the site owners aren’t laughing. However, a breach of employees’ (very) per...

lesen...
Logo
22.05.2015

Nachrichten

HP Security Research OSINT (OpenSource Intelligence) articles of interest – May 22, 2015

Welcome to the May 22nd edition of the HP Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen...