More Like This
-
In mobile device era, Hewlett-Packard recommits to PCs at HP Discover
IT pros are encouraged by Hewlett Packard's new support services plan for PCs, but would like to see mobile devices from the company.11 Jun 2013
-
Hewlett-Packard (HP)
HP (Hewlett-Packard), perhaps best known for its line of personal computer printers, has also long been a leader in mid-range computer systems.25 Jan 2011
-
Hewlett-Packard to cut 27,000 jobs
HP is to cut 27,000 jobs, or 8% of its workforce, as part of a plan to achieve annual savings of up to $3.5bn by the end of fiscal year 201424 May 2012
-
HP printer discovery issue highlights printer security best practices
In wake of an HP printer discovery issue where Google indexed thousands of printers, learn best practices to keep network printers off the Internet.03 Jul 2013
-
Converting to cloud: Ranum Q&A with Lee Heath
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process.03 Sep 2013
-
Opinion: Software [in]security -- software flaws in application architecture
Many defects aren't found with code review. Gary McGraw and Jim DelGrosso think architectural risk analysis is a must to uncover software flaws.10 Sep 2013
-
Hewlett-Packard’s 'information platform' gambles on unstructured data
Earlier this week, Hewlett-Packard announced plans to release a new information platform, which places an emphasis on analyzing unstructured data. Is the move a good one?02 Dec 2011
-
IT certification guide: Vendor-specific information security certifications
Updated for 2013, experts Ed Tittel and Mary Lemons guide you through the crowded field of vendor-specific information security certifications.23 May 2013
-
Introduction: Vendor-neutral security certifications for your career path
Ed Tittel and Mary Lemons offer the definitive primer for vendor-neutral security certifications in 2013.23 May 2013
-
SearchSecurity.com's IT security certifications guide
Afraid of making a wrong turn in your career? Our newly updated 2013 guide to information security certifications maps out all your options.23 May 2013
-
HP MSA gets SSD support
Hewlett-Packard upgrades its entry-level SAN array, giving HP MSA some SSD support, a new controller and 4 TB hard drives.13 May 2013
-
Hewlett-Packard, CDW partnership irks HP partners
Hewlett-Packard plans to work with CDW to grow its SMB business, a move that angers the mass of other HP solution providers.18 Aug 2008
-
Hewlett-Packard launches LTO-5 tape
HP supports LTO-5 support with midrange MSL tape libraries, and enterprise tape libraries will follow. HP is also offering software utility TapeAssure to monitor the health of LTO-5 cartridges an...29 Mar 2010
-
Hewlett-Packard UK PSG boss tells channel it's 'business as usual'
The UK head of the Personal Systems Group (PSG) at HP has moved to calm customer and channel fears it is looking to rapidly exit the PC business. Since the announcement made by HP's CEO last week t...25 Aug 2011
-
Reassess embedded systems security in light of printer vulnerabilities
Recent high-profile printer vulnerabilities illustrate why enterprises need to be aware of embedded systems security. Expert Nick Lewis discusses.21 Feb 2013
-
The Huawei security risk: Factors to consider before buying Chinese IT
Cover story: The U.S. government says Chinese IT giants Huawei and ZTE pose too much risk. But do they? Joel Snyder offers his take.28 Jan 2013
-
McGraw's mobile app security strategy: Three legs of 'trusted on busted'
Struggling to define your mobile app security strategy? Gary McGraw offers a manifesto to help get infosec and app developers on the same page.13 Feb 2013
-
Bill & Dave – How Hewlett and Packard Built the World's Greatest Company, by Michael S. Malone
Book review: Bill & Dave...03 Nov 2008
-
Software development maturity driving down ZDI flaw submissions
Secure software development training is having an impact on vulnerability submissions, according to Brian Gorenc of HP TippingPoint DVLabs.04 Dec 2012
-
Thirteen principles to ensure enterprise system security
Designing sound enterprise system security is possible by following Gary McGraw's 13 principles, many of which have held true for decades.17 Jan 2013
Security Management Strategies for the CIO