Logo
25.05.2016

Produkte

Unleash awesome velocity

How Microsoft and HPE secured DevOps and unleashed awesome velocity......

lesen
Logo
24.05.2016

Produkte

Discover Data Security in Vegas

With daily articles exposing data breach after data breach, data security is a hot topic and continues to grow. For those attending HPE Discover 2016, this is great chance to catch the Data Security sessions....

lesen
Logo
23.05.2016

Produkte

Tackling data theft with Format Preserving Encryption

It’s a jungle out there in cyberspace. Businesses have been targeted by an increasing number of sophisticated attacks focused on either stealing intellectual property, personal information, data or extorting money through ransomware. Organizations must have comprehensive securit...

lesen
Logo
20.05.2016

Produkte

Challenges and solutions for a rapidly transforming business landscape

Protect your digital enteprise; a discussion of challenges and solutions for a rapidly transforming business landscape. ...

lesen
Logo
20.05.2016

Produkte

Eureka! Never under estimate a good discovery!

Traditionally, after years of continuous development and management of web assets, organizations often experience an erosion of reliable data about the number of web applications they own, whether their web applications are internally or externally exposed, and what functionalit...

lesen
Logo
20.05.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – May 20, 2016

Welcome to the May 20th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
19.05.2016

Produkte

A deep insight into the people, processes & technology of cybercrime and hacking

Read more on how cyber-crime groups organize the business of hacking through integration of people, process, technology, and motivation to create this half a trillion dollar empire. ...

lesen
Logo
19.05.2016

Produkte

Application security gets automated: Machine learning boosts financial services

Automate analytics and machine learning to enhance application security for financial services....

lesen
Logo
18.05.2016

Produkte

A deep insight into people, process, & technology of cyber-crime and hacking

The Cyber-crime, Inc. or the business of hacking is five times the size of cyber security business. The business of hacking is at around $500 billion and the business of providing cyber security is at around $90 billion today. The business of hacking is an organized crime that i...

lesen
Logo
18.05.2016

Produkte

Two HPE customers show you how you can embrace security at DevOps speed

Two enterprises wanted to revise methodologies toward Agile and DevOps, yet neither wanted to compromise on security.  See how they achieved both....

lesen
Logo
17.05.2016

Produkte

What is the business of hacking?

To win in the marketplace and beat competition your organization must innovate.  But they’re not properly planning for a key competitor, hackers. There is an entire marketplace out there trying to financially benefit from your organization.  But if you understand the v...

lesen
Logo
13.05.2016

Produkte

Accelerating Secure Continuous Integration with Fortify on Demand

Continuous integration and new methods of automation have accelerated the delivery of production software..  Developers are using a variety of tools, repositories and methods to collaborate, accelerate and deliver software faster than ever....

lesen
Logo
13.05.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – May 13, 2016

 Welcome to the May 13th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
12.05.2016

Produkte

I'm a little sensitive about my apps

It’s not too often that I find interesting application security news in the Journal of the American Medical Association (JAMA), but a recent study of Android mobile apps focused on diabetes published in JAMA added to the growing evidence of the enormity of security risk in the he...

lesen
Logo
12.05.2016

Nachrichten

Attackers leveraging fear in the board room

Fear can be a powerful motivator, and when you are a C-level executive, a subpoena to appear always generates a certain level of anxiety. Recently, HPE Security Research discovered a widespread phishing campaign that targets executives and uses fear to get malware installed on a...

lesen
Logo
10.05.2016

Produkte

Help! The toaster hacked my bank account!

My toaster hacked my bank account. My refrigerator stole my credit card number. My car hijacked my social security number. Sounds crazy but these truths are coming--and some are already here--both at home, and in the enterprise. ...

lesen
Logo
10.05.2016

Produkte

Doubling down on data-centric security for governments and global enterprises

The attack surface is rapidly expanding. With the influx of cloud, Big Data and the Internet of Things (IoT), it's critical for organizations to take a data-centric approach to securing their sensitive information. Today, May 10, 2016, HPE announced the global release of HP...

lesen
Logo
10.05.2016

Produkte

Intelligent SecOps: How to reduce business and security risks

In today's world, an explosion of data occurs every millisecond. There is data generated from transactions, customer behavior, fraudulent activity, and more. When you take all of the moving parts into consideration, it can seem overwhelming. Here's how your organization bet...

lesen
Logo
06.05.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – May 6, 2016

Welcome to the May 6th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
05.05.2016

Produkte

Put your big data to work with big data security analytics

Put big data to work to spot and remove security threats....

lesen
Logo
05.05.2016

Produkte

World Password Day--Don't be an easy target

Today, May 5th, marks "World Password Day"--the reminder we all need – and should probably get more often than once a year – about the importance of smarter password security. Read more......

lesen
Logo
03.05.2016

Produkte

Experience HPE Protect

Attend HPE Protect to explore an integrated approach to security and risk management. ...

lesen
Logo
29.04.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – April 29, 2016

 Welcome to the April 29th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
29.04.2016

Produkte

Myth vs reality: Advanced analytics for security operations

Learn best practices for applying rigorous analytics to an intelligent operations center and explore a wide range of analytics, from the real-time correlation of threat intelligence to investigation to proactive hunting of threat actors and their activities. Join us at HPE ...

lesen
Logo
28.04.2016

Artikel

Lokale Anbieter müssen ihr Portfolio erweitern

Der Standortvorteil ist nicht alles; deutsche Service Provider sollten die Wertschöpfungskette herauf gehen. Kleinere Anbieter müssen dafür die Grundlagen ihres Geschäfts überdenken, meint Thomas Kitz, Director Service Provider Sales bei Hewlett-Packard Enterprise.

lesen
Logo
26.04.2016

Produkte

Is your key management appliance actually FIPS validated?

Security-conscious customers care a great deal about FIPS 140-2—the standard that determines security assurance level. Security vendors may tell you that their security appliances are FIPS validated, but ask them to prove it! You have the right to ask a security vendor to point ...

lesen
Logo
22.04.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – April 22, 2016

Welcome to the April 22nd edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
22.04.2016

Produkte

Announcing the general availability of HPE Security Fortify 16.1

We are excited to announce our 16.1 product release for HPE Security Fortify Software Security Center, HPE Security Fortify Static Code Analyzer, HPE Security WebInspect, HPE Security WebInspect Enterprise and HPE Security Fortify Runtime solutions.  ...

lesen
Logo
20.04.2016

Produkte

Lock and Key: Decrypting the Cybersecurity Act of 2015’s encryption mandate

Federal organizations are in dire need of data-centric solutions with simplified protection to mitigate security risks. Government’s demand for data protection is higher than ever. Now is the time to take security measures to the next level....

lesen
Logo
19.04.2016

Produkte

Discover how to protect your digital enterprise

HPE Discover is June 7-9 in Las Vegas! Are you ready to expand your cybersecurity horizons? HPE Security will be there—ready to give you the scoop on what you can do to protect your digital enterprise....

lesen
Logo
15.04.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – April 15, 2016

Welcome to the April 15th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
15.04.2016

Produkte

Let's encrypt!

Recent headlines showed the following:  Let’s Encrypt reaches one million certificate encryption milestone.  So, why did this make HPE Security – Data Security so enthused? ...

lesen
Logo
14.04.2016

Produkte

HPE Government Summit encourages attendees to protect their digital enterprise

Held in the city that’s the very heart of the U.S. Government, security professionals converged to the HPE Government Summit 2016 to see what technologies HPE Security is using to escalate cybersecurity both in our government, and at large....

lesen
Logo
14.04.2016

Artikel

Workstations im VR-Bereich von HP und Nvidia

HP und Nvidia wollen gemeinsam Workstation-Lösungen für den Virtual-Reality-Bereich umsetzen. So soll die professionelle Gestaltung von VR-Erfahrungen gefördert werden.

lesen
Logo
12.04.2016

Nachrichten

Monetizing stolen credit card data

Many consumers are numb to breach notifications these days, especially those related to credit/debit card information. HPE Security Research took a closer look at how the attackers are actually monetizing the data they obtain....

lesen
Logo
12.04.2016

Artikel

Server- und Speicher­platt­for­men für HPC und Big Data

Hewlett Packard Enterprise (HPE) kündigt Rechenplattformen und -lösungen an, die speziell für High-Performance-Computing (HPC) und Big-Data-Anwendungen optimiert sein sollen.

lesen
Logo
12.04.2016

Artikel

HPE erweitert Proliant-Server und stellt persistent Main Memory vor

Hewlett Packard Enterprise (HPE) baut sein Proliant-Portfolio weiter aus, um den Kunden bei der Modernisierung ihrer Rechenzentren zu helfen. Dabei kommt künftig auch performanter NVDIMM-Arbeitsspeicher zum Einsatz.

lesen
Logo
08.04.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – April 8, 2016

Welcome to the April 8th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
08.04.2016

Produkte

Is security-as-a-service the next evolution in enterprise security?

Is security-as-a-service the next logical expansion of your enterprise cloud services?...

lesen
Logo
08.04.2016

Nachrichten

The Panama Papers: Protecting your deepest secrets

The latest information leak, “The Panama Papers,” highlights the increasing trend of both the public release of sensitive information and the unseen private data breaches used by criminals to quietly extort large sums of money from corporations. Here are some thoughts and advice...

lesen