Please turn on your JavaScript for this page to function normally.
HP secures the mobile workforce

HP announced new offerings to help SMBs prepare their technology infrastructures for a growing mobile workforce. With more than 1.1 billion mobile appliances in use worldwide, …

HP identifies the sophistication of security attacks

HP published the 2011 Top Cyber Security Risks Report, which identifies the growing sophistication and severity of security attacks and the resulting risks. The report …

The current challenges of being a CISO

In the last decade or so, the role of Chief Information Security Officer (CISO) was established in the great majority of business, government and non-profit organizations, and …

Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks

Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …

HP expands its Enterprise Security Solutions portfolio

HP expanded its Enterprise Security Solutions portfolio to help enterprises establish and execute a comprehensive security strategy to deal with threats resulting from the …

HP Intelligent Management Center multiple vulnerabilities

Multiple vulnerabilities have been reported in HP Intelligent Management Center (IMC), which can be exploited by malicious people to compromise a vulnerable system, according …

New HP application security solutions

HP announced the first application security analysis solution that discovers the root cause of software vulnerabilities by observing attacks in real-time. HP Fortify Real-Time …

Application security vulnerabilities

Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …

Top cybercrime weapon: Web exploit toolkits

HP identified a significant increase in the volume of organized cybercrime targeting data centers and networks, which can lead to financial and data loss. While there were …

Don't miss

Cybersecurity news