HPE Software Blog: Protect Your Assets
Share |

Decreased maturity with hunt-only programsOpen in a New Window

state of secops 2017_big photo.jpg

In this 8-part blog series, we give a high-level overview of the findings from the 2017 State of Security Operations Report.


Adopting an open architecture to secure your businessOpen in a New Window


In the past, Security environments have traditionally been closed, sealed and ‘secured’; but as organizations look to solve today’s more complex problems, they are now embracing the idea of adopting open standards and architectures. By evolving to accept new, innovative and open standards, security organizations can now look to solve complex problems in a modern way.


Don't jeopardize your innovationOpen in a New Window

rsa 2017.jpg

Join HPE Security at the largest security conference in the world! 


The 2017 State of Security OperationsOpen in a New Window

state of secops 2017_big photo.jpg

The State of Security Operations 2017 report of capabilities and maturity of cyber defense organizations was released by Hewlett Packard Enterprise today, and provides deep analysis on the effectiveness of organizations’ security operations centers (SOCs), and best practices for mitigating risk in the evolving cybersecurity landscape. 


The true state of security in DevOps and how to bridge the gapOpen in a New Window


Gain practical advice that DevOps and Application Security Teams, of any maturity level, can take away from recent survey findings. Build your roadmap for adding security into every step of the SDLC, from coding through production. 


Understanding and detecting advanced malware that slips past your perimeter defenseOpen in a New Window


External facing DNS servers are vulnerable to a myriad of cyberattacks; however, threats aren't always outside your firewalls—they can come from anywhere. Today’s targeted attacks come with a host of challenges. How do you detect malware that easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way (oftentimes, before you even notice it’s there)?


HPE supports Scholarships for Women Studying Information Security (SWSIS)Open in a New Window


I had the opportunity to attend the 32nd Annual Computer Security Applications Conference in Los Angeles, California where 16 scholarships co-funded by Hewlett Packard Enterprise (HPE) were awarded to Scholarships for Women Studying Information Security (SWSIS).


GDPR: It DOES apply to youOpen in a New Window

GDPR Webinar.png

Unless you've been living under a rock, you've heard of the General Data Protection Regulation (GDPR). What you may not know, however, is that it doesn't only apply to international companies. GDPR--which officially takes effect in May of 2018--applies to any business that collects or stores European citizens' data. 



Complexity is the enemy of securityOpen in a New Window


We understand that you may be struggling to find the proper balance between a growing compliance burden and increasing demand for more strategic operational security coverage. Let us help answer your questions.


HPE Security Fortify Software Security Center and HPE Security Fortify Static Code Analyzer 16.2Open in a New Window

hpe logo.png

HPE Security Fortify is pleased to announce the immediate availability of Fortify Software Security Center (SSC) and HPE Security Fortify Static Code Analyzer (SCA) 16.2, and HPE Security Fortify Software Security Content 2016 Update 4.


Gain confidence to securely innovate at RSAC 2017Open in a New Window

security lock.png

Security must accelerate, not impede innovation. We invite you to join us at RSA Conference 2017, to help you learn more about building security directly into your data and your apps.


Staffing a successful cyber threat hunting team, Part 3: Skills to look for in a threat hunterOpen in a New Window


There are many skillsets that compliment hunt operations and matching individual talents to the hunting process allows for more specialized concentrations. It’s often difficult, or even impossible, to find individuals that carry complete security knowledge in every domain, and they will always have a work preference.


Staffing a successful cyber threat hunting team, Part 2: How cyber security hunting worksOpen in a New Window

soc big 1.jpg

Welcome to part 2 in a series: “Staffing a successful cyber threat hunting team.”


Is your SOC Intelligent?Open in a New Window


SOC _.jpg

Having a Threat Intelligence function isn’t a "go big or stay home" proposition.


GDPR, Data Security, and more--at HPE Discover LondonOpen in a New Window

datasec image.jpeg

This year at Discover London, a hot topic is the EU General Data Protection Regulation, or GDPR.  We also have several sessions that pertain strictly to Data Security, IoT, and Ransomware. 


Protect your organization against ransomwareOpen in a New Window


Learn how to mitigate risk and proactively protect your organization against ransomware at HPE Discover 2016 London! 


You need not compromise security in your DevOps journeyOpen in a New Window

devops 1.jpg

How to integrate security and DevOps to meet faster delivery cycles without compromising application security. 


Consumer privacy: Oxymoron or opportunity?Open in a New Window

Scene_at_the_Signing_of_the_Constitution_of_the_United_States (1).jpg

The meaning of “providing for the common defense” has changed significantly since 1787. After all, the writers of the Constitution could not anticipate the services government would be able to provide to citizens through computers, or the potential for threats to and loss of valuable information.


Discover intelligent security operationsOpen in a New Window


Intelligent security operations enable you to reduce business and security risks. Learn more about how you can improve your organization’s ability to detect and respond to malicious security events at HPE Discover London.


Staffing a successful cyber threat hunting team, Part 1: Cyber threat huntingOpen in a New Window

cyber threat hunting.jpg

Cyber threat hunting is no longer a nice-to-have. It’s now becoming a necessity for many security organizations. Join us for a 3-part series, “Staffing a successful cyber threat hunting team.” This post is part 1 in the series.

Contact Us

Vivit Worldwide
P.O. Box 18510
Boulder, CO 80308

Email: info@vivit-worldwide.org


Vivit's mission is to serve
the Hewlett Packard
Enterprise User
Community through
Advocacy, Community,
and Education.