array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(34) "HEWLETT PACKARD ENTERPRISE COMPANY"
["slug"]=>
string(43) "1bf40-us-hewlett-packard-enterprise-company"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/acffdbc7-aab8-4b43-9f40-a5af1a6f194a"
["description"]=>
string(327) "Scytale, acquired by Hewlett Packard Enterprise company in 2020.
Scytale was originally started in 2017 by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, Splunk, and Duo Security who want to help enterprise engineers securely and easily build identity-driven, large-scale distributed software systems. "
["address_street"]=>
string(20) "1701 E Mossy Oaks Rd"
["address_place"]=>
string(6) "Spring"
["address_region"]=>
string(5) "Texas"
["founding_date"]=>
string(10) "1939-02-28"
["website_domain"]=>
string(7) "hpe.com"
["website_url"]=>
string(19) "https://www.hpe.com"
["industry_codes"]=>
array(4) {
[0]=>
string(24) "Computer Storage Devices"
[1]=>
string(56) "Computers and Computer Peripheral Equipment and Software"
[2]=>
string(20) "Prepackaged Software"
[3]=>
string(51) "Computer Related Services, Not Elsewhere Classified"
}
["employee_count"]=>
int(60200)
["article_count"]=>
int(2372)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(68) "A week at ITBiz: Quantum computers and cyber threats - Sciencemag.cz"
["snippet_en"]=>
string(128) "Fraudsters have invented a new system of ATM fraud. After months of stagnation, the volume of DDoS attacks on the Czech Republic"
["url"]=>
string(77) "https://sciencemag.cz/tyden-na-itbiz-kvantove-pocitace-a-kyberneticke-hrozby/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/be3f1da9-3d86-4d76-a1b5-ba8745ddeacf"
["source"]=>
string(13) "sciencemag.cz"
["publication_date"]=>
string(10) "2024-04-03"
["categories"]=>
array(4) {
[0]=>
string(13) "Data Security"
[1]=>
string(5) "Fraud"
[2]=>
string(5) "Event"
[3]=>
string(10) "Cybercrime"
}
}
[1]=>
array(7) {
["title_en"]=>
string(71) "Storage: StoneFly, an inexpensive solution against ransomware | LeMagIT"
["snippet_en"]=>
string(194) "The startup is the commercial showcase for DNF, which designs white label storage bays for large manufacturers. Its offering offers SMEs cutting-edge protection mechanisms on low-cost equipment."
["url"]=>
string(107) "https://www.lemagit.fr/actualites/366577637/Stockage-StoneFly-une-solution-peu-chere-contre-les-ransomwares"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/89b243e0-e229-474e-a76e-ec1fbc61df8b"
["source"]=>
string(10) "lemagit.fr"
["publication_date"]=>
string(10) "2024-04-02"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[2]=>
array(7) {
["title_en"]=>
string(48) "Enabling Security in Vietnam's Digital Landscape"
["snippet_en"]=>
string(173) "The Vietnam Information Security Day highlighted the pivotal role of cybersecurity in the nation's digital transformation, aiming to fortify technical systems and platforms."
["url"]=>
string(83) "https://opengovasia.com/2024/03/21/enabling-security-in-vietnams-digital-landscape/"
["image_url"]=>
NULL
["source"]=>
string(15) "opengovasia.com"
["publication_date"]=>
string(10) "2024-03-20"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[3]=>
array(7) {
["title_en"]=>
string(138) "Taipei Fubon Bank joins hands with HPE to build Taiwan’s first AI hawk eye fraud detection financial protection network | World Magazine"
["snippet_en"]=>
string(997) "According to statistics from the Taiwan Criminal Bureau, the cumulative amount of "defrauded" by Taiwanese people in 2023 exceeded 8.8 billion yuan. Once people remit money, it can be transferred more than three times within five minutes. In order to prevent crime, financial institutions will conduct detection whenever there is a warning. However, with Taipei Fubon Bank's more than 8 million accounts, the number of transactions per day can reach millions, and up to six people need manual detection after being alerted by the system. More than a thousand pens. Each warning transaction requires further name verification, risk scoring or enhanced review. Under manual processing, it is difficult to update the supervision regulations and list database at any time. Even if only 3 out of 10,000 of these suspicious transactions are actually problematic, in order to maintain financial order and attach importance to social responsibilities, Beifu Bank will still conduct inspections one by one."
["url"]=>
string(37) "https://www.cw.com.tw/article/5129619"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/09d283f2-019f-4601-a2c5-d3402c7ed34b"
["source"]=>
string(9) "cw.com.tw"
["publication_date"]=>
string(10) "2024-03-15"
["categories"]=>
array(2) {
[0]=>
string(5) "Fraud"
[1]=>
string(10) "Cybercrime"
}
}
[4]=>
array(7) {
["title_en"]=>
string(64) "Chinese hackers infiltrating America’s critical infrastructure"
["snippet_en"]=>
string(215) "There are dire implications for Russia and China making a strategic pivot from theft of military and scientific intellectual property to exploiting key infrastructure sectors and pre-positioning hidden cyberweapons."
["url"]=>
string(100) "https://www.washingtontimes.com/news/2024/feb/28/chinese-hackers-infiltrating-americas-critical-inf/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/d78296c0-34bc-496a-be1c-875e51895244"
["source"]=>
string(19) "washingtontimes.com"
["publication_date"]=>
string(10) "2024-02-28"
["categories"]=>
array(9) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(24) "Systemic Risk Management"
[2]=>
string(13) "Data Security"
[3]=>
string(5) "Fraud"
[4]=>
string(11) "Geopolitics"
[5]=>
string(21) "Intellectual Property"
[6]=>
string(15) "Corporate Theft"
[7]=>
string(21) "Competitive Behaviour"
[8]=>
string(11) "Regulations"
}
}
[5]=>
array(7) {
["title_en"]=>
string(33) "New security vulnerability at HPE"
["snippet_en"]=>
string(79) "You are currently accessing Channel Web German through your Enterprise account."
["url"]=>
string(61) "https://www.crn.de/news/4170914/neue-sicherheitslucke-bei-hpe"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/3c732715-5fd4-4238-964e-5470737a8769"
["source"]=>
string(6) "crn.de"
["publication_date"]=>
string(10) "2024-02-07"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[6]=>
array(7) {
["title_en"]=>
string(70) "HPE investigates new breach after having data for sale on the dark web"
["snippet_en"]=>
string(224) "Hewlett Packard Enterprise (HPE) is investigating a possible new breach after a threat actor posted allegedly stolen company data for sale on a hacker forum, claiming it contained credentials and other sensitive information."
["url"]=>
string(94) "https://www.cisoadvisor.com.br/hpe-investiga-nova-violacao-apos-ter-dados-a-venda-na-dark-web/"
["image_url"]=>
NULL
["source"]=>
string(18) "cisoadvisor.com.br"
["publication_date"]=>
string(10) "2024-02-06"
["categories"]=>
array(8) {
[0]=>
string(11) "US Politics"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
[3]=>
string(8) "Politics"
[4]=>
string(5) "Legal"
[5]=>
string(16) "Customer Privacy"
[6]=>
string(15) "Corporate Theft"
[7]=>
string(41) "E-commerce and Technological Developments"
}
}
[7]=>
array(7) {
["title_en"]=>
string(44) "Juniper adds data center networks to Mist AI"
["snippet_en"]=>
string(102) "Juniper takes Mist AI to the data center via its Apstra hardware-agnostic network automation software."
["url"]=>
string(103) "https://www.techtarget.com/searchnetworking/news/366568157/Juniper-adds-data-center-networks-to-Mist-AI"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/2971392a-4b2e-4e57-a5b8-b304d354b98d"
["source"]=>
string(14) "techtarget.com"
["publication_date"]=>
string(10) "2024-01-29"
["categories"]=>
array(4) {
[0]=>
string(13) "Data Security"
[1]=>
string(16) "Customer Privacy"
[2]=>
string(10) "Cybercrime"
[3]=>
string(11) "Acquisition"
}
}
[8]=>
array(7) {
["title_en"]=>
string(25) "Data security and privacy"
["snippet_en"]=>
string(151) "Learn about data security and privacy strategies that protect enterprises against breaches and data loss, including encryption, governance and backups."
["url"]=>
string(77) "https://www.techtarget.com/searchsecurity/resources/Data-security-and-privacy"
["image_url"]=>
NULL
["source"]=>
string(14) "techtarget.com"
["publication_date"]=>
string(10) "2024-01-26"
["categories"]=>
array(5) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
[2]=>
string(5) "Legal"
[3]=>
string(16) "Customer Privacy"
[4]=>
string(17) "Academic Research"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(258)
}
[1]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(188)
}
[2]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(181)
}
[3]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(167)
}
[4]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(132)
}
[5]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(127)
}
[6]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(125)
}
[7]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(101)
}
[8]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(97)
}
[9]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(92)
}
[10]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(89)
}
[11]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(84)
}
[12]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(79)
}
[13]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(77)
}
[14]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(70)
}
[15]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(67)
}
[16]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(60)
}
[17]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(58)
}
[18]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(54)
}
[19]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(50)
}
[20]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(48)
}
[21]=>
array(2) {
["name"]=>
string(21) "Competitive Behaviour"
["count"]=>
int(36)
}
[22]=>
array(2) {
["name"]=>
string(24) "Stock Research & Ratings"
["count"]=>
int(34)
}
[23]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(33)
}
[24]=>
array(2) {
["name"]=>
string(17) "Energy Management"
["count"]=>
int(30)
}
[25]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(27)
}
[26]=>
array(2) {
["name"]=>
string(11) "Competition"
["count"]=>
int(27)
}
[27]=>
array(2) {
["name"]=>
string(6) "Merger"
["count"]=>
int(27)
}
[28]=>
array(2) {
["name"]=>
string(19) "Green & Responsible"
["count"]=>
int(25)
}
[29]=>
array(2) {
["name"]=>
string(20) "Corporate Governance"
["count"]=>
int(25)
}
}
}
1bf40-us-hewlett-packard-enterprise-company
HEWLETT PACKARD ENTERPRISE COMPANY
Location
Texas
Founded
1939-02-28
Website
https://www.hpe.com
Articles
2372 Articles
Category
Computer Storage Devices
Computers and Computer Peripheral Equipment and Software
Prepackaged Software
Computer Related Services, Not Elsewhere Classified
Description
Scytale, acquired by Hewlett Packard Enterprise company in 2020.
Scytale was originally started in 2017 by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, Splunk, and Duo Security who want to help enterprise engineers securely and easily build identity-driven, large-scale distributed software systems.
The startup is the commercial showcase for DNF, which designs white label storage bays for large manufacturers. Its offering offers SMEs cutting-edge protection mechanisms on low-cost equipment.
The Vietnam Information Security Day highlighted the pivotal role of cybersecurity in the nation's digital transformation, aiming to fortify technical systems and platforms.
According to statistics from the Taiwan Criminal Bureau, the cumulative amount of "defrauded" by Taiwanese people in 2023 exceeded 8.8 billion yuan. Once people remit money, it can be transferred more than three times within five minutes. In order to prevent crime, financial institutions will conduct detection whenever there is a warning. However, with Taipei Fubon Bank's more than 8 million accounts, the number of transactions per day can reach millions, and up to six people need manual detection after being alerted by the system. More than a thousand pens. Each warning transaction requires further name verification, risk scoring or enhanced review. Under manual processing, it is difficult to update the supervision regulations and list database at any time. Even if only 3 out of 10,000 of these suspicious transactions are actually problematic, in order to maintain financial order and attach importance to social responsibilities, Beifu Bank will still conduct inspections one by one.
There are dire implications for Russia and China making a strategic pivot from theft of military and scientific intellectual property to exploiting key infrastructure sectors and pre-positioning hidden cyberweapons.
Hewlett Packard Enterprise (HPE) is investigating a possible new breach after a threat actor posted allegedly stolen company data for sale on a hacker forum, claiming it contained credentials and other sensitive information.
Learn about data security and privacy strategies that protect enterprises against breaches and data loss, including encryption, governance and backups.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.