- About Vivit
- LUGs & SIGs
- Vivit Blogs
- News & Events
- Knowledge Base
|HPE Software Blog: Protect Your Assets|
In this 8-part blog series, we give a high-level overview of the findings from the 2017 State of Security Operations Report.
In the past, Security environments have traditionally been closed, sealed and ‘secured’; but as organizations look to solve today’s more complex problems, they are now embracing the idea of adopting open standards and architectures. By evolving to accept new, innovative and open standards, security organizations can now look to solve complex problems in a modern way.
Join HPE Security at the largest security conference in the world!
The State of Security Operations 2017 report of capabilities and maturity of cyber defense organizations was released by Hewlett Packard Enterprise today, and provides deep analysis on the effectiveness of organizations’ security operations centers (SOCs), and best practices for mitigating risk in the evolving cybersecurity landscape.
Gain practical advice that DevOps and Application Security Teams, of any maturity level, can take away from recent survey findings. Build your roadmap for adding security into every step of the SDLC, from coding through production.
External facing DNS servers are vulnerable to a myriad of cyberattacks; however, threats aren't always outside your firewalls—they can come from anywhere. Today’s targeted attacks come with a host of challenges. How do you detect malware that easily gets past traditional security solutions, placing your DNS infrastructure in harm’s way (oftentimes, before you even notice it’s there)?
I had the opportunity to attend the 32nd Annual Computer Security Applications Conference in Los Angeles, California where 16 scholarships co-funded by Hewlett Packard Enterprise (HPE) were awarded to Scholarships for Women Studying Information Security (SWSIS).
Unless you've been living under a rock, you've heard of the General Data Protection Regulation (GDPR). What you may not know, however, is that it doesn't only apply to international companies. GDPR--which officially takes effect in May of 2018--applies to any business that collects or stores European citizens' data.
We understand that you may be struggling to find the proper balance between a growing compliance burden and increasing demand for more strategic operational security coverage. Let us help answer your questions.
HPE Security Fortify is pleased to announce the immediate availability of Fortify Software Security Center (SSC) and HPE Security Fortify Static Code Analyzer (SCA) 16.2, and HPE Security Fortify Software Security Content 2016 Update 4.
Security must accelerate, not impede innovation. We invite you to join us at RSA Conference 2017, to help you learn more about building security directly into your data and your apps.
There are many skillsets that compliment hunt operations and matching individual talents to the hunting process allows for more specialized concentrations. It’s often difficult, or even impossible, to find individuals that carry complete security knowledge in every domain, and they will always have a work preference.
Welcome to part 2 in a series: “Staffing a successful cyber threat hunting team.”
Having a Threat Intelligence function isn’t a "go big or stay home" proposition.
This year at Discover London, a hot topic is the EU General Data Protection Regulation, or GDPR. We also have several sessions that pertain strictly to Data Security, IoT, and Ransomware.
Learn how to mitigate risk and proactively protect your organization against ransomware at HPE Discover 2016 London!
How to integrate security and DevOps to meet faster delivery cycles without compromising application security.
The meaning of “providing for the common defense” has changed significantly since 1787. After all, the writers of the Constitution could not anticipate the services government would be able to provide to citizens through computers, or the potential for threats to and loss of valuable information.
Intelligent security operations enable you to reduce business and security risks. Learn more about how you can improve your organization’s ability to detect and respond to malicious security events at HPE Discover London.
Cyber threat hunting is no longer a nice-to-have. It’s now becoming a necessity for many security organizations. Join us for a 3-part series, “Staffing a successful cyber threat hunting team.” This post is part 1 in the series.