Blog Posts Tagged with "Hewlett Packard"
HP Releases ProCurve 5400 zl Switches Security Bulletin
April 13, 2012 Added by:Headlines
"A potential security vulnerability has been identified with certain HP ProCurve 5400 zl switches containing compact flash cards which may be infected with a virus. Reuse of an infected compact flash card in a personal computer could result in a compromise of that system's integrity..."
Comments (0)
Living in the Clouds: Master the Cloud Event - Toronto
February 02, 2012 Added by:Rafal Los
Security is more about understanding the model you'll be undertaking than trying to fit some ideals you have about the cloud security nirvana. Each provider model (IaaS, PaaS, SaaS, etc.) has differing offerings and quirks for security. Watch those contracts closely...
Comments (0)
Master the Cloud, Montréal - Notes from the Road Part 2
February 01, 2012 Added by:Rafal Los
As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...
Comments (0)
Master the Cloud, Montréal: Notes from the Road...
January 31, 2012 Added by:Rafal Los
Cloud computing provides the customer an unparalleled chance to jump into a new computing paradigm which sheds some of the legacy issues and the excessive costs associated with unused capacity most of our organizations have humming along in our data centers...
Comments (0)
Top Security Company Acquisitions of 2011
January 31, 2012 Added by:Bill Gerneglia
The acquisition pace in the security industry has been steady the last few years due to the global proliferation of security breaches. Will this acquisition pace continue? Many analysts believe it will accelerate to address the proliferation of global security threats...
Comments (0)
Printer Hack: Researchers Can Set Media’s Pants on Fire
December 07, 2011 Added by:Brian Smithson
What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...
Comments (0)
HP Printer Hack Video Shows Sensitive Data Tweet Too
December 05, 2011 Added by:Dan Dieterle
The researchers showed how a maliciously formed print job could cause an HP printer’s firmware to be reprogrammed so it acts like a copy machine – sending an exact print job to any place in the world, and the attackers also get a tweet showing sensitive information parsed from the print job...
Comments (1)
Millions of Printers Vulnerable to Hacking Attacks
November 29, 2011 Added by:Headlines
“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."
Comments (0)
Understanding the Customer is the Key to Success
July 27, 2011 Added by:Rahul Neel Mani
ArcSight which was acquired by HP last year was started when the Dot Com bubble had burst. CTO Forum talks to Hugh Njemanze, ArcSight Founder and VP & CTO, HP Security Solutions about the company’s journey so far and how the company has been able to sustain a robust growth...
Comments (0)
Software Security Incidents Cost an Average $300,000
April 22, 2011 Added by:Robert Siciliano
Enterprises must move from technological security silos to enterprise security intelligence. This can be achieved through the interaction of different technologies as well as contextual analyses of integrated security and business information...
Comments (1)
Hewlett Packard to Switch to WebOS on Future PC’s
March 11, 2011 Added by:Dan Dieterle
It looks like Microsoft may be forced into making a decision. To change and adapt to the times, or continue with business as usual and end up becoming obsolete. But hey, they still have the XBox right?
Comments (1)
Top Ten FCPA Investigations of 2010
January 07, 2011 Added by:Thomas Fox
While enforcement actions can provide the DOJ/SEC's current thinking on FCPA compliance best practices, the public information made available during investigations can provide compliance professional many opportunities for teaching points and lessons learned by others...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider