Blog Posts Tagged with "Hewlett Packard"

69dafe8b58066478aea48f3d0f384820

HP Releases ProCurve 5400 zl Switches Security Bulletin

April 13, 2012 Added by:Headlines

"A potential security vulnerability has been identified with certain HP ProCurve 5400 zl switches containing compact flash cards which may be infected with a virus. Reuse of an infected compact flash card in a personal computer could result in a compromise of that system's integrity..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Living in the Clouds: Master the Cloud Event - Toronto

February 02, 2012 Added by:Rafal Los

Security is more about understanding the model you'll be undertaking than trying to fit some ideals you have about the cloud security nirvana. Each provider model (IaaS, PaaS, SaaS, etc.) has differing offerings and quirks for security. Watch those contracts closely...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Master the Cloud, Montréal - Notes from the Road Part 2

February 01, 2012 Added by:Rafal Los

As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Master the Cloud, Montréal: Notes from the Road...

January 31, 2012 Added by:Rafal Los

Cloud computing provides the customer an unparalleled chance to jump into a new computing paradigm which sheds some of the legacy issues and the excessive costs associated with unused capacity most of our organizations have humming along in our data centers...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Top Security Company Acquisitions of 2011

January 31, 2012 Added by:Bill Gerneglia

The acquisition pace in the security industry has been steady the last few years due to the global proliferation of security breaches. Will this acquisition pace continue? Many analysts believe it will accelerate to address the proliferation of global security threats...

Comments  (0)

7ca9cf570bb97d22b119f3a70d335ede

Printer Hack: Researchers Can Set Media’s Pants on Fire

December 07, 2011 Added by:Brian Smithson

What was most irresponsible in this case was that the researchers took their exploit of one model of printer from one manufacturer and without even a cursory investigation extrapolated the threat to “hundreds of millions” of printers and fed it to a media hungry for sensational headlines...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

HP Printer Hack Video Shows Sensitive Data Tweet Too

December 05, 2011 Added by:Dan Dieterle

The researchers showed how a maliciously formed print job could cause an HP printer’s firmware to be reprogrammed so it acts like a copy machine – sending an exact print job to any place in the world, and the attackers also get a tweet showing sensitive information parsed from the print job...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Millions of Printers Vulnerable to Hacking Attacks

November 29, 2011 Added by:Headlines

“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."

Comments  (0)

F520f65cba281c31e29c857faa651872

Understanding the Customer is the Key to Success

July 27, 2011 Added by:Rahul Neel Mani

ArcSight which was acquired by HP last year was started when the Dot Com bubble had burst. CTO Forum talks to Hugh Njemanze, ArcSight Founder and VP & CTO, HP Security Solutions about the company’s journey so far and how the company has been able to sustain a robust growth...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Software Security Incidents Cost an Average $300,000

April 22, 2011 Added by:Robert Siciliano

Enterprises must move from technological security silos to enterprise security intelligence. This can be achieved through the interaction of different technologies as well as contextual analyses of integrated security and business information...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Hewlett Packard to Switch to WebOS on Future PC’s

March 11, 2011 Added by:Dan Dieterle

It looks like Microsoft may be forced into making a decision. To change and adapt to the times, or continue with business as usual and end up becoming obsolete. But hey, they still have the XBox right?

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Top Ten FCPA Investigations of 2010

January 07, 2011 Added by:Thomas Fox

While enforcement actions can provide the DOJ/SEC's current thinking on FCPA compliance best practices, the public information made available during investigations can provide compliance professional many opportunities for teaching points and lessons learned by others...

Comments  (0)