HPE Business Insights
Showing results for 
Search instead for 
Do you mean 

Everything you need to know about Heartbleed

Alec_Wagner ‎04-21-2014 03:10 PM - edited ‎04-21-2014 03:15 PM

The Heartbleed bug has been topping technology news searches this week, and you need answers. What’s the real vulnerability here—passwords or certificates? How should my IT shop respond? Is open source doomed? Fortunately, there’s been a lot of great coverage in the HP Software blogosphere. Whether you’re a CIO, CISO or IT worker in the trenches, these posts and videos will arm you with what you need to know about Heartbleed.


Heartache, heartburn or heart attack? In episode 12 of Discover Performance Weekly, HP Software Evangelist Paul Muller talks with Jacob West, CTO of HP Enterprise Security Products. Together, they tackle these aspects of the bug:


  • How big of a threat is Heartbleed?
  • Initial steps for Heartbleed triage
  • How hard is it to fix?
  • What exactly is Heartbleed?
  • What questions should CIOs and CISOs be asking?

Get answers to those questions and more by watching “Heartbleed bug: How worried should you be?”


In a new Google Hangout, Joy Forsythe of HP Security Research joins Joanna Burkey of HP TippingPoint DVLabs to discuss the origins of the Heartbleed bug. Joy tracks down the cause of the bug, while Joanna demystifies new terminology and acronyms associated with the Heartbleed bug, and explains how HP Fortify and HP TippingPoint were able to quickly protect customers. To learn more about Heartbleed—including how static analysis might have kept it from getting into the wild—watch “Heartbleed: Joy and Joanna stop the bleeding.”


On the Fortify - Application Security blog, HP Software Principal Security Architect Daniel Miessler offers “Thoughts on the Heartbleed Bug,” including what the bug is, implications, analysis, commentary and further reading.


Finally, HP’s Mark Painter offers reassurance in “HP Enterprise Security Products handles Heartbleed.” In his post on the HP Security Products blog, he explains how key groups at the company have put forth a solution or method of detection that let organizations know how to assess where they stand.


For more insightful articles about security and critical trends in enterprise software, sign up for the Discover Performance e-newsletter.

About the Author


Alec Wagner is a longtime writer & editor, enterprise IT insider, and (generally) fearless digital nomad.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
1-3 December 2015
Discover 2015 London
Discover 2015 in London, the ultimate showcase technology event for business and IT professionals to learn, connect, and grow.
Read more
November 2015
Software Online Expert Days
Join us online to talk directly with our Software experts.
Read more
View all