Check out Keypoint Intelligence’s Cybersecurity page!
Subject matter experts from every corner of HP Inc. addressed a core group of industry analysts at the HP Security Summit 2023, held in New York City on December 12. The small-group and one-on-one sessions covered nearly every facet of HP’s security strategy from OS and firmware platform security for the company’s PC and print products to security assessment services and current threat trends.
Emerging technologies are propagating emerging threats, HP noted. The “Internet of Things” (IoT) and edge architecture mean there are more potentially vulnerable devices than ever before, while AI-powered tools are accelerating the velocity at which threats can be developed and distributed. Another issue: the eventual mainstream availability of quantum computing hardware and software. While that will be a boon to any industry, it also threatens the encryption protocols in place to protect data and communications. With quantum tools, hackers will be able to crack current encryption methods, rendering them obsolete possibly within a decade.
With these developments in mind, HP detailed its core principles to protect endpoints today and for its expected 3-7 years of in-field service:
Keypoint Intelligence Opinion
For years, HP has been touting its Wolf Security comprehensive endpoint security ecosystem that aims to protect devices from cyberattacks, starting at the hardware level and extending to software and services. And while its marketing is indeed slick, Wolf Security’s underpinnings are even slicker. And HP is not afraid to put its solutions to the test. In fact, the company is the only OEM to have submitted products for—and passed—all three of our Security Validation Testing tracks for device penetration, firmware resilience, and policy compliance.
Browse through our Industry Reports Page (latest reports only). Log in to the InfoCenter to view research, reports, and studies on cybersecurity through our Workplace CompleteView Advisory Service. If you’re not a subscriber, contact us for more info by clicking here.
Keep Reading
The Insider’s Guide to Cybersecurity: Bolstering Your Digital Defenses
The Insider’s Guide to Cybersecurity: The Expanding Role of AI in Hacking
The Insider’s Guide to Cybersecurity: The Rise of AI-Driven Hacking