HP DISCOVER Insider
The HP Discover Event blog is the official blog for the HP Discover showcase technology event where you can learn about game-changing innovations in enterprise software, hardware, services, and networking. Visit the blog for regular behind the scenes updates and insights.

Study reveals 70% of IoT devices are vulnerable to attack

87576-pic-700y600.jpgBefore you get too excited about all the convenience and collaboration possibilities presented by the Internet of Things (IoT), consider the security implications. Users are transmitting highly sensitive personal data across multiple unprotected attack vectors. It’s time for security to take center stage before a backlash begins.

HP Discover on demand: Big Data, cloud, security, and mobility

Keynote.jpgDidn’t see quite everything you wanted to at HP Discover 2014 in Las Vegas? We’ve got your back. During the show, we recorded dozens of breakout sessions that you can watch on demand. In addition, we have exclusive interviews with key executives and industry leaders that you can only watch here.

Explore the big pillars at HP Discover: cloud, security, Big Data, and mobility

section1-zone2.jpgStart planning now for the topics and solutions you want to explore during HP Discover 2014 in Las Vegas. Here’s an outline of the four primary technology areas we’ll be covering, and some links to get you started on diving deeper.

 

Are CISOs drowning in dysfunctional security technology?

raf_los_headshot.jpg It's easy to get starry-eyed over new shiny boxes that hundreds of vendors parade before you. As a security officer, your role is to make all these various pieces fit together to secure your organization. Our security expert, Rafal Los explains why this is important and what you'll learn at HP Discover 2013 in Las Vegas.  

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation