Blog

06May

Incident Response: How to Fight Back

The goal of this survey was to get a clearer picture of what IR teams are up against today, the types of attacks they see and what defenses they have in place to detect and respond to these threats.
  • Posted by HPE  Posted on 06 May  0 Comments
  • Read More
06May

State of Security Operations

In this first-of-its-kind report, HP summarizes the capabilities, lessons learned, and performance levels of security operations based upon maturity assessments performed on worldwide organizations.
  • Posted by HPE  Posted on 06 May  0 Comments
  • Read More
05May

How Application Security Protects Your Enterprise

Join us for episode 30 of Discover Performance Weekly as we discuss application security.HPE Software evangelist and VP of Strategic Marketing, Paul Muller (@xthestreams), sits down with author and CTO of HPE’s Enterprise Security Products, Jacob West (@sfjacob), to take a look at application security and how it can...
  • Posted by HPE  Posted on 05 May  0 Comments
  • Read More
21April

FREAK Attacks: How Vulnerable Are You?

While the damage from FREAK appears to be minimal, the attack underscores the reality that it’s nearly impossible to guarantee software will be 100 percent secure.
  • Posted by Charles Cooper  Posted on 21 Apr  0 Comments
  • Read More
21April

IT Girds for Cyberwar ‘Tipping Point’

After suffering through years of escalating cyberattacks, businesses are about to get more help from the federal government. But that doesn’t mean their IT security headaches are going to disappear.
  • Posted by Charles Cooper  Posted on 21 Apr  0 Comments
  • Read More
20April

Who Are Those Guys?

Back in the 1990s, IT had to deal with nuisance attacks by script kiddies and goofballs out to prove their technical chops to friends. But the threat landscape has morphed rapidly as criminals and state actors figured out that there’s a goldmine of information in enterprise IT systems to be captured and exploited for profit. 
  • cyber security, cyber threats, hackers, hacking, script kiddies, security
  • Posted by Charles Cooper  Posted on 20 Apr  0 Comments
  • Read More
19March

Firewalls: More Critical than Ever

Everyone complains about firewalls, but nobody is abandoning them, either. There are good reasons for their resiliency.
  • Posted by HPE  Posted on 19 Mar  0 Comments
  • Read More
06March

Looming Threat: Transportation Infrastructure

Some cyber attackers want to inflict more than just digital damage. In terms of such risk, a baseline security standard for critical transportation infrastructure simply isn’t being met.
  • Posted by HPE  Posted on 06 Mar  0 Comments
  • Read More
18February

Application Security is Hard

Staying ahead of the steady onslaught of attacks on applications seems like a never-ending battle. But it’s a battle worth fighting.
  • Posted by HPE  Posted on 18 Feb  0 Comments
  • Read More