ADS BY GOOGLE
Cybersecurity

In 2007, there were virtually no mobile apps. Last year alone, over 100 billion apps were downloaded, generating $26 billion in sales. App stores operated by Apple and Google now offer more than a million apps each and people every day depend on apps like Facebook, Google Maps and Uber...
When the Tsunami of system failures paralyzes your organization from a coordinated cyber-attack, it’s too late for the CEO to think your organization can “get through this event.” It’s too late. Too many top executives and futurists are giddy about what the future holds with the “Int...
For retailers everywhere, it’s a challenging new day. Security threats are a constant – both inside their four walls and out. The big security breaches we hear about on the news; the smaller ones sometimes not. But their impact remains costly to us all. The need for mobility, rapidly e...
With the iCloud scandal seemingly in its past, Apple announced new iPhones, updates to iPad and MacBook as well as news on OSX Yosemite. Although consumers will have to wait to get their hands on some of that new stuff, what they can get is the latest release of iOS 8 that Apple made a...
We show you how to dig deep to find hidden and covert processes, clandestine communications, and signs of misconduct on your network. In a previous article [1], I described how to obtain a memory image from a Windows computer that would allow forensic analysis. I briefly discussed us...
According to Gartner, Big Data refers to "high volume, high velocity, and/or high variety information assets” – and, this is the key – “that require new forms of processing to enable enhanced decision making, insight discovery and process optimization." While Big Data may seem like an ...
From the way legal teams prepare for trial to how they communicate with clients and other professionals, technology is quickly becoming an influential member of the practice. However, even in today’s technology-driven world, not all firms can label themselves tech savvy. To help those ...
Ransomware is the latest example of the increasingly sophisticated and damaging inventions of hackers. Individuals and organizations of all sizes are finding that their data has been locked down or encrypted until a ransom is paid. One program, CryptoLocker, infected more than 300,000 ...
Despite all the news about hackers infiltrating major corporations, most businesses continue to leave themselves woefully unprotected. Some surveys estimate more than 70% of businesses perform vulnerability tests on less than 10% of their cloud, mobile and web applications. A majority ...
The threats facing network operators all over the world, spanning service providers, enterprises, cloud and hosting providers and mobile operators alike, are by no means stalling. While optimism is always the name of the game, we know all too well in security that trying to keep pace w...
Incident response involves addressing and managing the security events on a network and the execution of proper responses to those events. The end game is to limit the damage and reduce recovery time and costs. This is achieved with the implementation of an incident response plan tha...
The online world has become a dangerous place. According to a survey, 90 percent of all companies fell victim to a security breach in the last twelve months. Hacking and advanced persistent threats (APTs) have rendered the two-factor authentication token, now over 20 years old, essenti...
Mr. George Romas is the Technical Director of the Cybersecurity Solutions Group at HP Enterprise Services, U.S. Public Sector. SecuritySolutionsWatch.com: Thank you for joining us again today, George. It's been roughly one year since our first meeting when we spoke about building sec...
With large security breaches constantly in the news, businesses are rightly concerned about security. Thankfully, big data and machine learning can work together to help. They read like a list of horror stories for businesses big and small alike. Sony’s PlayStation Network is hacked t...
Heartland, based in Princeton, New Jersey, has improved governance results in innovative ways across the organization, thanks to both security best practices and HP Fortify tools. Heartland Payment Systems has successfully leveraged software-assurance tools and best practices to driv...
There has been a lot of media attention on Heartbleed and as always that means a lot of bizarre and often conflicting advice. I sat down (for a very long time) to find the truth of the matter and bring it together in one single article for those involved in enterprise mobility. "The ...
Given the mountains of data now floating around, it is perhaps inevitable that the very function of data analytics is seen as somehow intrusive. There’s a constant glut of reports, columns and other stories bemoaning the lack of data privacy – and at times, they’re entirely justified. ...
What have you done online today – checked LinkedIn? Facebook? Twitter? Opened and sent business emails? Used business apps? Every business employee also has a private life – and it’s becoming increasingly difficult to keep the two separate. Rather than ignoring the growing role of soci...
Rob Wigley is Director, Cybersecurity Consulting Services at HP Enterprise Services, U.S. Public Sector. He has more than 30 years of information technology experience supporting manufacturing, high tech, healthcare, and public sector market segments. For the last 10 years, he has focu...
Yesterday one of the biggest outages in history, if not the biggest outage, happened to the Internet in China. Primarily and directly affected by that outage were most of the people living in China and browsing the Internet in China. Secondary, all companies doing online business in C...
Savvy organizations, HP among them, are turning to preventing attacks, rather than just detecting them and remediating them. The high cost of unwanted intrusion and malware across corporate networks is well known. Less talked-about are the successful ways that organizations are thwart...
information and other data that must be protected. Medical practices, credit unions and independent retailers all face HIPAA, PCI and other standards. With so many regulations and limited budgets, how can small businesses keep up? Here are the top security mistakes that leave SMBs vuln...
Within the ThreatConnect Intelligence Research Team (TCIRT), we feel that sharing what we know, whether publicly or privately, helps to grow our organization. We see information sharing as a key investment area, allowing our team to more efficiently save time and money while helping u...
Perpetual preparedness is tough to maintain. Vulnerability management tends to be an overwhelming task because of the growing number of devices and continual stream of warnings, alerts and notifications— whether it is security patches or zero day exploits, you name it. Mapping how thes...
In this series of blogs we will expose how fraudsters operate, we will run through several typical fraud scenarios, we will investigate where, how and why legacy detection solutions fall short, and what can be done to improve them. Banks and Insurance companies lose billions of dollar...
Cyber Monday commerce sales are expected to reach $2.2 billion this year, according to the Adobe Digital Index 2013 Online Shopping Forecast, making the Monday after Thanksgiving one of the most important days of the year for online retailers. Adobe also estimates that Cyber Monday sal...
Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access? Both are not the same and careful knowledge must be used when interacting with a shell access vs. terminal access...
Cybercriminals are employing more sophisticated techniques all the time and far too many companies and organizations still don’t have the protection they really need to safeguard their systems. The prevalence of targeted attacks and advanced persistent threats (APTs) is disturbing. ...
The focus shouldn’t be on threats, but rather on how those threats might change. At the technology level, this focus on change shifts the focus from a static “locked door” approach to security to the immune system metaphor I discussed last year. But there’s more to architecting for sec...
One of the first initiatives for secure booting has been the Unified Extensible Firmware Interface (UEFI) Initiative. This is a superior replacement of the Basic Input Output System (BIOS) and a secure interface between the operating system and the hardware firmware. The UEFI Initiat...
Identity and access management solutions provide governance and visibility capabilities that enable organizations to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. Enterprise IAM deployments are generally eff...
HP's CISO Brett Wahlin explains the increasing threats facing enterprises across the world and how companies are evaluating, and must evaluate, their options for not only dealing with them, but predicting them and preventing them. Join HP’s Chief Information Security Officer (CISO) to...
SecurityStockWatch.com: Thank you for joining us today, Steve, please tell us about your background and your role at HP. Steve Lazerowich: With over 15+ years’ experience with security solutions, I joined HP Enterprise Services in 2010 as a Senior Solutions Designer, responsible for ...
The reemergence of the Dirt Jumper botnet in association with fraudulent wire transfer and ACH transactions continues to highlight one simple truth: cybercriminals are all about money, whether it is generated directly via fraud or via access to information. Dirt Jumper came into the ...
Hackers and other attacks have become a major concern for businesses of all sizes. There are many reasons why your network could be taken out and rendered offline. Having your website down for even a few minutes can cause serious damage not only to your bottom line but also to your com...
In the world of information security, small businesses and the security needs of small businesses are often overlooked, particularly in the realm of application security. When looking at the investment required to build a robust application security program, it really doesn’t make sens...
CSC Global Cybersecurity, in a strategic partnership with HP, is helping companies and governments better understand and adapt to the tough cybersecurity landscape. We’re going to learn from a panel how professional services provider CSC, in a strategic partnership with HP, is helpi...
On a recent trip back to the United States from abroad, I stood in line with several others as we waited for Homeland Security officers to check our documents and credentials. You knew as you waited in that long line of other residents returning from their trips, that when the person a...
When we talk about online security there’s a school of thought that suggests you can either make it safe, or you can make it easy to use, but you can’t have both. As we see a sharp rise in online fraud and identity theft it seems that traditional passwords are neither. The 2012 Ident...
The course of consumerism is constantly evolving towards greater convenience. With the recent emergence of contactless payment and competition heating up in the mobile payment industry, there’s always more sophisticated technology in the pipeline. But, as ever, cyber criminals remain o...


ADS BY GOOGLE