Logo
26.08.2016

Nachrichten

A FalseCONNECT sense of security?

You have followed the advice of privacy and security experts. You’ve disabled SMS and are using an encrypted text-only chat service. You route your traffic through anonymizing proxies. You only visit HTTPS websites. You know that if you don’t see https:// and a lock in the addre...

lesen
Logo
25.08.2016

Produkte

Be your own Master of Security

Be your own Master of Security! Learn how at HPE Protect....

lesen
Logo
25.08.2016

Produkte

IoT: The Internet of ALL-the-things

Today, we have a multitude of things that have interconnectivity. But, the world isn't going to become LESS technologically advanced, so the best thing to do is educate ourselves on the IoT and how to keep ourselves, and our information, secure....

lesen
Logo
23.08.2016

Produkte

OMB’s updated Information Management Guidance focuses on cybersecurity

Each day, federal agencies are filtering through unprecedented quantities of data of varying sensitivity to meet missions. As our government continues to optimize use of the best technological resources available, it is critical that policy supports this adaptation and growth...

lesen
Logo
19.08.2016

Produkte

HPE Security Fortify Taxonomy Web Site 2016 Update

HPE Security Fortify Software Security Research (SSR), in collaboration with HPE Security Fortify on Demand, is pleased to announce the immediate availability of the updated Vulncat web site for navigating the HPE Security Fortify Taxonomy of Software Security Errors....

lesen
Logo
19.08.2016

Produkte

Fact or Fiction: Mr. Robot

Are you a fan of USA Network's Mr. Robot? So are we (along with millions of others). How many of the situations presented in Mr. Robot are feasible? My good friend and HPE Security Researcher, Kerry Matre, can tell you--there's far less fiction to Mr. Robot than one might t...

lesen
Logo
18.08.2016

Produkte

What’s in a name?

Women in tech--why are there so few of us and what can we do to change the status quo? ...

lesen
Logo
18.08.2016

Produkte

Real customers, real security stories at HPE Protect

During HPE Protect, September 13-16, you'll learn how to make effective security simple, and have the opportunity to attend several sessions tailored to YOUR security needs/wants, including a keynote address by Blockchain Revolution co-author, Alex Tapscott, and several customer...

lesen
Logo
17.08.2016

Produkte

The business of hacking: A government perspective

In recent years, cyber hacking has evolved into a highly profitable and organized criminal enterprise. To better defend the enterprise, we must first find out more about these criminals, who they are, and what they aim to accomplish....

lesen
Logo
16.08.2016

Produkte

HPE Info Management & Governance solution user? We'll see you at Protect!

HPE Information Management & Governance solution users, are you ready for HPE Protect? At HPE Security, we're ready to see you and talk security. ...

lesen
Logo
16.08.2016

Produkte

The HPE Security--Data Security team wants YOU at HPE Protect 2016

Headed to HPE Protect? Don’t forget to visit the Data Security team, and check out our many sessions available to attendees!...

lesen
Logo
16.08.2016

Produkte

Customers speak out at HPE Protect

During HPE Protect, September 13-16, you'll learn how to make effective security simple, and have the opportunity to attend several sessions tailored to YOUR security needs/wants, including a keynote address by Blockchain Revolution co-author, Alex Tapscott, and several customer...

lesen
Logo
12.08.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – August 12, 2016

Welcome to the August 12th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
11.08.2016

Produkte

Security operations and activate workshops at HPE Protect 2016

 Offered as a special discounted-price engagement for our customers, these are 2-day workshops with an opportunity to network with some of the industry’s best security experts while learning the ins and outs of making your security organization successful....

lesen
Logo
11.08.2016

Produkte

Highlighting intuitive and powerful cybersecurity--at HPE Protect 2016

Keynote speakers and technically focused breakout sessions for HPE Protect 2016 have been announced! ...

lesen
Logo
10.08.2016

Produkte

The Federal SOC of the future

Federal IT experts have varying opinions on how to build the Next Generation Security Operations Center to properly protect digital assets and remain agile to react and respond to threats – all while balancing government budget restraints. Read about the three key security pilla...

lesen
Logo
09.08.2016

Produkte

Arm your digital units to master cybersecurity

At the Federal Cybersecurity Summit, join cybersecurity experts from the public and private sectors to explore combat-ready strategies to prepare for and uncover invisible threats, transform adversaries into competitors and overcome legacy challenges....

lesen
Logo
08.08.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – August 5, 2016

Welcome to the August 5th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
05.08.2016

Produkte

HPE Software Security Assurance (SSA) Workshop

Attention SOC & Incident Response Managers, Program Owners, Team Leaders, and Information Security Executives! At HPE Protect 2016 (Sept. 13-16), we have an opportunity for you to learn what it takes to create a successful Software Security Assurance (SSA) program....

lesen
Logo
05.08.2016

Produkte

How the internet of things will transform government data security

The Internet of Things (IoT) has brought unprecedented potential for federal efficiency and growth. However, this boom of machine-to-machine communication comes with significant risks to cybersecurity....

lesen
Logo
04.08.2016

Nachrichten

Introducing Maltese: An Open Source Malware Traffic Emulator

Today, we release Maltese – an open source Malware Traffic Emulator that allows you to generate malicious traffic in order to test the effectiveness of malware detector solutions, currently focusing on DNS traffic....

lesen
Logo
03.08.2016

Produkte

Learn how to fortify your security at HPE Protect

HPE Security Fortify users: We've got something for YOU at HPE Protect! ...

lesen
Logo
03.08.2016

Nachrichten

Introducing JNDI Injection and LDAP Entry Poisoning

When reports surface that the White House and NATO were hacked using an unknown vulnerability, it peaked our interest. When it was later announced that the Java Naming and Directory Interface (JNDI) was used, we decided to look at other Java APIs to see if we could find similar ...

lesen
Logo
29.07.2016

Produkte

2017: The make-it or break-it year for federal cybersecurity

2017 is going to be a critical year for cybersecurity in the federal government. The White House’s 2017 fiscal budget requests $19 billion to support IT security efforts and modernize infrastructure. One critical part of this request is the $3.1 billion Information Technolo...

lesen
Logo
29.07.2016

Produkte

Security Hunt Teams Workshop at HPE Protect 2016

Attention SOC & Incident Response Managers, Program Owners, Team Leaders, and Information Security Executives! At HPE Protect 2016 (Sept. 13-16), we have an opportunity for you to learn what it takes to build a hunt team....

lesen
Logo
29.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 29, 2016

Welcome to the July 29th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
28.07.2016

Produkte

Best practices in Security Operations—Why SIEM and Advanced Analytics are stronger together

Paul Brettle, Security Architect, talks about why SIEM and Advanced Analytics (UBA and DMA) are stronger together. Paul also walks through a demo of the user experience....

lesen
Logo
27.07.2016

Produkte

Extend your public sector security capabilities at HPE Protect

Attend HPE Protect to learn how to address data protection requirements and information governance solutions to help you prepare proactively for legal and compliance challenges. ...

lesen
Logo
27.07.2016

Nachrichten

HPE Security Research at Black Hat USA 2016

Black Hat USA 2106 is almost upon us. Once again, Hewlett Packard Enterprise Security brings fresh research and tools to the desert oasis that is Las Vegas. Here’s a peek at the upcoming content provided by our researchers....

lesen
Logo
25.07.2016

Produkte

Health IT--Supporting the MHS Transformation

Defense Health agencies can count on us to provide the technology, solutions and expertise to support their objectives of quality care initiatives, increasing mobile access and patient satisfaction, while lowering costs and improving health outcomes. Join us at the 201...

lesen
Logo
22.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 22, 2016

Welcome to the July 22nd edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news....

lesen
Logo
22.07.2016

Produkte

Best practices in Security Operations—Why real-time monitoring/in-memory correlation are critical

Paul Brettle, HPE Security Architect, talks about why real-time monitoring and in-memory correlation are critical....

lesen
Logo
20.07.2016

Produkte

Comprehensive application security with Black Duck Hub and HPE Fortify

Black Duck is pleased to announce the integration of their Hub solution into HPE Security Fortify Software Security Center (SSC), which helps organizations measure and control their application security posture and provides visibility into software risk across the ente...

lesen
Logo
19.07.2016

Produkte

Discover data-centric security at HPE Protect

HPE Security -- Data Security users have much to gain from attending HPE Protect in September! From learning about new technologies to exploring how to integrate data protection into your legacy systems, we've got you covered! ...

lesen
Logo
18.07.2016

Produkte

Implementing intelligent SecOps capability

What does it take to implement an intelligent security operations capability?  An intelligent security operations center (SOC) is not a technology-in-a-box solution but is a process of maturation and advancing competencies within an organization. In this new whitepaper by HP...

lesen
Logo
18.07.2016

Artikel

HP-Abonnement für Hardware

Mit HP Device as a Service (DaaS) können Kunden für Hardware pro Arbeitsplatz auf monatlicher Basis bezahlen. Das Abonnement enthalte aktuelle Technologie, Kundenservice und Unterstützung bei Konfiguration, Installation, Datenmigration und Recycling.

lesen
Logo
18.07.2016

Artikel

HP-Abonnement für Hardware

Mit HP Device as a Service (DaaS) können Kunden für Hardware pro Arbeitsplatz auf monatlicher Basis bezahlen. Das Abonnement enthalte aktuelle Technologie, Kundenservice und Unterstützung bei Konfiguration, Installation, Datenmigration und Recycling.

lesen
Logo
15.07.2016

Nachrichten

Privacy: The quarter-year in review

Following a large, fast-moving space such as information privacy is a bit like birdwatching – you think you’re on the trail of one creature, and then some other gaudy feathered thing swoops down at you. Without further ado, the quarter’s sharp-beaked highlights....

lesen
Logo
15.07.2016

Nachrichten

HPE Security Research OSINT (OpenSource Intelligence) articles of interest – July 15, 2016

Welcome to the July 15th edition of the HPE Security Research OSINT articles of interest. This is a list of publically available articles that we find relevant in today's security news.  ...

lesen
Logo
13.07.2016

Produkte

HPE Security Fortify and Black Duck partner

 Announcing the partnership between HPE Security Fortify and Black Duck, providing organizations a way to measure and control their application security posture and deliver visibility into software risk across the enterprise. ...

lesen