array(3) { ["company_details"]=> array(13) { ["name"]=> string(34) "HEWLETT PACKARD ENTERPRISE COMPANY" ["slug"]=> string(43) "1bf40-us-hewlett-packard-enterprise-company" ["logo"]=> string(84) "https://images.businessradar.com/linkedin_logos/acffdbc7-aab8-4b43-9f40-a5af1a6f194a" ["description"]=> string(327) "Scytale, acquired by Hewlett Packard Enterprise company in 2020. Scytale was originally started in 2017 by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, Splunk, and Duo Security who want to help enterprise engineers securely and easily build identity-driven, large-scale distributed software systems. " ["address_street"]=> string(20) "1701 E Mossy Oaks Rd" ["address_place"]=> string(6) "Spring" ["address_region"]=> string(5) "Texas" ["founding_date"]=> string(10) "1939-02-28" ["website_domain"]=> string(7) "hpe.com" ["website_url"]=> string(19) "https://www.hpe.com" ["industry_codes"]=> array(4) { [0]=> string(24) "Computer Storage Devices" [1]=> string(56) "Computers and Computer Peripheral Equipment and Software" [2]=> string(20) "Prepackaged Software" [3]=> string(51) "Computer Related Services, Not Elsewhere Classified" } ["employee_count"]=> int(60200) ["article_count"]=> int(2372) } ["articles"]=> array(9) { [0]=> array(7) { ["title_en"]=> string(68) "A week at ITBiz: Quantum computers and cyber threats - Sciencemag.cz" ["snippet_en"]=> string(128) "Fraudsters have invented a new system of ATM fraud. After months of stagnation, the volume of DDoS attacks on the Czech Republic" ["url"]=> string(77) "https://sciencemag.cz/tyden-na-itbiz-kvantove-pocitace-a-kyberneticke-hrozby/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/be3f1da9-3d86-4d76-a1b5-ba8745ddeacf" ["source"]=> string(13) "sciencemag.cz" ["publication_date"]=> string(10) "2024-04-03" ["categories"]=> array(4) { [0]=> string(13) "Data Security" [1]=> string(5) "Fraud" [2]=> string(5) "Event" [3]=> string(10) "Cybercrime" } } [1]=> array(7) { ["title_en"]=> string(71) "Storage: StoneFly, an inexpensive solution against ransomware | LeMagIT" ["snippet_en"]=> string(194) "The startup is the commercial showcase for DNF, which designs white label storage bays for large manufacturers. Its offering offers SMEs cutting-edge protection mechanisms on low-cost equipment." ["url"]=> string(107) "https://www.lemagit.fr/actualites/366577637/Stockage-StoneFly-une-solution-peu-chere-contre-les-ransomwares" ["image_url"]=> string(78) "https://images.businessradar.com/articles/89b243e0-e229-474e-a76e-ec1fbc61df8b" ["source"]=> string(10) "lemagit.fr" ["publication_date"]=> string(10) "2024-04-02" ["categories"]=> array(1) { [0]=> string(10) "Cybercrime" } } [2]=> array(7) { ["title_en"]=> string(48) "Enabling Security in Vietnam's Digital Landscape" ["snippet_en"]=> string(173) "The Vietnam Information Security Day highlighted the pivotal role of cybersecurity in the nation's digital transformation, aiming to fortify technical systems and platforms." ["url"]=> string(83) "https://opengovasia.com/2024/03/21/enabling-security-in-vietnams-digital-landscape/" ["image_url"]=> NULL ["source"]=> string(15) "opengovasia.com" ["publication_date"]=> string(10) "2024-03-20" ["categories"]=> array(2) { [0]=> string(13) "Data Security" [1]=> string(10) "Cybercrime" } } [3]=> array(7) { ["title_en"]=> string(138) "Taipei Fubon Bank joins hands with HPE to build Taiwan’s first AI hawk eye fraud detection financial protection network | World Magazine" ["snippet_en"]=> string(997) "According to statistics from the Taiwan Criminal Bureau, the cumulative amount of "defrauded" by Taiwanese people in 2023 exceeded 8.8 billion yuan. Once people remit money, it can be transferred more than three times within five minutes. In order to prevent crime, financial institutions will conduct detection whenever there is a warning. However, with Taipei Fubon Bank's more than 8 million accounts, the number of transactions per day can reach millions, and up to six people need manual detection after being alerted by the system. More than a thousand pens. Each warning transaction requires further name verification, risk scoring or enhanced review. Under manual processing, it is difficult to update the supervision regulations and list database at any time. Even if only 3 out of 10,000 of these suspicious transactions are actually problematic, in order to maintain financial order and attach importance to social responsibilities, Beifu Bank will still conduct inspections one by one." ["url"]=> string(37) "https://www.cw.com.tw/article/5129619" ["image_url"]=> string(78) "https://images.businessradar.com/articles/09d283f2-019f-4601-a2c5-d3402c7ed34b" ["source"]=> string(9) "cw.com.tw" ["publication_date"]=> string(10) "2024-03-15" ["categories"]=> array(2) { [0]=> string(5) "Fraud" [1]=> string(10) "Cybercrime" } } [4]=> array(7) { ["title_en"]=> string(64) "Chinese hackers infiltrating America’s critical infrastructure" ["snippet_en"]=> string(215) "There are dire implications for Russia and China making a strategic pivot from theft of military and scientific intellectual property to exploiting key infrastructure sectors and pre-positioning hidden cyberweapons." ["url"]=> string(100) "https://www.washingtontimes.com/news/2024/feb/28/chinese-hackers-infiltrating-americas-critical-inf/" ["image_url"]=> string(78) "https://images.businessradar.com/articles/d78296c0-34bc-496a-be1c-875e51895244" ["source"]=> string(19) "washingtontimes.com" ["publication_date"]=> string(10) "2024-02-28" ["categories"]=> array(9) { [0]=> string(10) "Cybercrime" [1]=> string(24) "Systemic Risk Management" [2]=> string(13) "Data Security" [3]=> string(5) "Fraud" [4]=> string(11) "Geopolitics" [5]=> string(21) "Intellectual Property" [6]=> string(15) "Corporate Theft" [7]=> string(21) "Competitive Behaviour" [8]=> string(11) "Regulations" } } [5]=> array(7) { ["title_en"]=> string(33) "New security vulnerability at HPE" ["snippet_en"]=> string(79) "You are currently accessing Channel Web German through your Enterprise account." ["url"]=> string(61) "https://www.crn.de/news/4170914/neue-sicherheitslucke-bei-hpe" ["image_url"]=> string(78) "https://images.businessradar.com/articles/3c732715-5fd4-4238-964e-5470737a8769" ["source"]=> string(6) "crn.de" ["publication_date"]=> string(10) "2024-02-07" ["categories"]=> array(2) { [0]=> string(13) "Data Security" [1]=> string(10) "Cybercrime" } } [6]=> array(7) { ["title_en"]=> string(70) "HPE investigates new breach after having data for sale on the dark web" ["snippet_en"]=> string(224) "Hewlett Packard Enterprise (HPE) is investigating a possible new breach after a threat actor posted allegedly stolen company data for sale on a hacker forum, claiming it contained credentials and other sensitive information." ["url"]=> string(94) "https://www.cisoadvisor.com.br/hpe-investiga-nova-violacao-apos-ter-dados-a-venda-na-dark-web/" ["image_url"]=> NULL ["source"]=> string(18) "cisoadvisor.com.br" ["publication_date"]=> string(10) "2024-02-06" ["categories"]=> array(8) { [0]=> string(11) "US Politics" [1]=> string(10) "Cybercrime" [2]=> string(13) "Data Security" [3]=> string(8) "Politics" [4]=> string(5) "Legal" [5]=> string(16) "Customer Privacy" [6]=> string(15) "Corporate Theft" [7]=> string(41) "E-commerce and Technological Developments" } } [7]=> array(7) { ["title_en"]=> string(44) "Juniper adds data center networks to Mist AI" ["snippet_en"]=> string(102) "Juniper takes Mist AI to the data center via its Apstra hardware-agnostic network automation software." ["url"]=> string(103) "https://www.techtarget.com/searchnetworking/news/366568157/Juniper-adds-data-center-networks-to-Mist-AI" ["image_url"]=> string(78) "https://images.businessradar.com/articles/2971392a-4b2e-4e57-a5b8-b304d354b98d" ["source"]=> string(14) "techtarget.com" ["publication_date"]=> string(10) "2024-01-29" ["categories"]=> array(4) { [0]=> string(13) "Data Security" [1]=> string(16) "Customer Privacy" [2]=> string(10) "Cybercrime" [3]=> string(11) "Acquisition" } } [8]=> array(7) { ["title_en"]=> string(25) "Data security and privacy" ["snippet_en"]=> string(151) "Learn about data security and privacy strategies that protect enterprises against breaches and data loss, including encryption, governance and backups." ["url"]=> string(77) "https://www.techtarget.com/searchsecurity/resources/Data-security-and-privacy" ["image_url"]=> NULL ["source"]=> string(14) "techtarget.com" ["publication_date"]=> string(10) "2024-01-26" ["categories"]=> array(5) { [0]=> string(10) "Cybercrime" [1]=> string(13) "Data Security" [2]=> string(5) "Legal" [3]=> string(16) "Customer Privacy" [4]=> string(17) "Academic Research" } } } ["category_annotations"]=> array(30) { [0]=> array(2) { ["name"]=> string(13) "Data Security" ["count"]=> int(258) } [1]=> array(2) { ["name"]=> string(13) "Collaboration" ["count"]=> int(188) } [2]=> array(2) { ["name"]=> string(14) "Product Launch" ["count"]=> int(181) } [3]=> array(2) { ["name"]=> string(12) "Stock Market" ["count"]=> int(167) } [4]=> array(2) { ["name"]=> string(11) "Acquisition" ["count"]=> int(132) } [5]=> array(2) { ["name"]=> string(18) "Expansion & Growth" ["count"]=> int(127) } [6]=> array(2) { ["name"]=> string(10) "Cybercrime" ["count"]=> int(125) } [7]=> array(2) { ["name"]=> string(24) "Quarterly/Annual Figures" ["count"]=> int(101) } [8]=> array(2) { ["name"]=> string(5) "R & D" ["count"]=> int(97) } [9]=> array(2) { ["name"]=> string(12) "Board Change" ["count"]=> int(92) } [10]=> array(2) { ["name"]=> string(16) "Customer Privacy" ["count"]=> int(89) } [11]=> array(2) { ["name"]=> string(20) "Business Development" ["count"]=> int(84) } [12]=> array(2) { ["name"]=> string(25) "Business Model Resilience" ["count"]=> int(79) } [13]=> array(2) { ["name"]=> string(31) "Financial Update/Profit Warning" ["count"]=> int(77) } [14]=> array(2) { ["name"]=> string(18) "General Investment" ["count"]=> int(70) } [15]=> array(2) { ["name"]=> string(41) "E-commerce and Technological Developments" ["count"]=> int(67) } [16]=> array(2) { ["name"]=> string(5) "Legal" ["count"]=> int(60) } [17]=> array(2) { ["name"]=> string(12) "Staff hiring" ["count"]=> int(58) } [18]=> array(2) { ["name"]=> string(15) "Market Movement" ["count"]=> int(54) } [19]=> array(2) { ["name"]=> string(5) "Award" ["count"]=> int(50) } [20]=> array(2) { ["name"]=> string(15) "Deals & Tenders" ["count"]=> int(48) } [21]=> array(2) { ["name"]=> string(21) "Competitive Behaviour" ["count"]=> int(36) } [22]=> array(2) { ["name"]=> string(24) "Stock Research & Ratings" ["count"]=> int(34) } [23]=> array(2) { ["name"]=> string(17) "Academic Research" ["count"]=> int(33) } [24]=> array(2) { ["name"]=> string(17) "Energy Management" ["count"]=> int(30) } [25]=> array(2) { ["name"]=> string(5) "Event" ["count"]=> int(27) } [26]=> array(2) { ["name"]=> string(11) "Competition" ["count"]=> int(27) } [27]=> array(2) { ["name"]=> string(6) "Merger" ["count"]=> int(27) } [28]=> array(2) { ["name"]=> string(19) "Green & Responsible" ["count"]=> int(25) } [29]=> array(2) { ["name"]=> string(20) "Corporate Governance" ["count"]=> int(25) } } } 1bf40-us-hewlett-packard-enterprise-company

HEWLETT PACKARD ENTERPRISE COMPANY

Location

Texas

Founded

1939-02-28

Website

https://www.hpe.com

Articles

2372 Articles

Category

Computer Storage Devices

Computers and Computer Peripheral Equipment and Software

Prepackaged Software

Computer Related Services, Not Elsewhere Classified

Description

Scytale, acquired by Hewlett Packard Enterprise company in 2020. Scytale was originally started in 2017 by seasoned engineers from Amazon Web Services, Google, Okta, PagerDuty, Splunk, and Duo Security who want to help enterprise engineers securely and easily build identity-driven, large-scale distributed software systems.

Articles

A week at ITBiz: Quantum computers and cyber threats - Sciencemag.cz

2024-04-03 (sciencemag.cz)

A week at ITBiz: Quantum computers and cyber threats - Sciencemag.cz

Fraudsters have invented a new system of ATM fraud. After months of stagnation, the volume of DDoS attacks on the Czech Republic

Read more
Storage: StoneFly, an inexpensive solution against ransomware | LeMagIT

2024-04-02 (lemagit.fr)

Storage: StoneFly, an inexpensive solution against ransomware | LeMagIT

The startup is the commercial showcase for DNF, which designs white label storage bays for large manufacturers. Its offering offers SMEs cutting-edge protection mechanisms on low-cost equipment.

Read more
Enabling Security in Vietnam's Digital Landscape

2024-03-20 (opengovasia.com)

Enabling Security in Vietnam's Digital Landscape

The Vietnam Information Security Day highlighted the pivotal role of cybersecurity in the nation's digital transformation, aiming to fortify technical systems and platforms.

Read more
Taipei Fubon Bank joins hands with HPE to build Taiwan’s first AI hawk eye fraud detection financial protection network | World Magazine

2024-03-15 (cw.com.tw)

Taipei Fubon Bank joins hands with HPE to build Taiwan’s first AI hawk eye fraud detection financial protection network | World Magazine

According to statistics from the Taiwan Criminal Bureau, the cumulative amount of "defrauded" by Taiwanese people in 2023 exceeded 8.8 billion yuan. Once people remit money, it can be transferred more than three times within five minutes. In order to prevent crime, financial institutions will conduct detection whenever there is a warning. However, with Taipei Fubon Bank's more than 8 million accounts, the number of transactions per day can reach millions, and up to six people need manual detection after being alerted by the system. More than a thousand pens. Each warning transaction requires further name verification, risk scoring or enhanced review. Under manual processing, it is difficult to update the supervision regulations and list database at any time. Even if only 3 out of 10,000 of these suspicious transactions are actually problematic, in order to maintain financial order and attach importance to social responsibilities, Beifu Bank will still conduct inspections one by one.

Read more
Chinese hackers infiltrating America’s critical infrastructure

2024-02-28 (washingtontimes.com)

Chinese hackers infiltrating America’s critical infrastructure

There are dire implications for Russia and China making a strategic pivot from theft of military and scientific intellectual property to exploiting key infrastructure sectors and pre-positioning hidden cyberweapons.

Read more
New security vulnerability at HPE

2024-02-07 (crn.de)

New security vulnerability at HPE

You are currently accessing Channel Web German through your Enterprise account.

Read more
HPE investigates new breach after having data for sale on the dark web

2024-02-06 (cisoadvisor.com.br)

HPE investigates new breach after having data for sale on the dark web

Hewlett Packard Enterprise (HPE) is investigating a possible new breach after a threat actor posted allegedly stolen company data for sale on a hacker forum, claiming it contained credentials and other sensitive information.

Read more
Juniper adds data center networks to Mist AI

2024-01-29 (techtarget.com)

Juniper adds data center networks to Mist AI

Juniper takes Mist AI to the data center via its Apstra hardware-agnostic network automation software.

Read more
Data security and privacy

2024-01-26 (techtarget.com)

Data security and privacy

Learn about data security and privacy strategies that protect enterprises against breaches and data loss, including encryption, governance and backups.

Read more

Newsletter subscription