Contact a sales agent

Contact us

HP Wolf Security Insights

HP Wolf Security Blog

Leading insights, research, and analysis from the HP threat analyst team

Visit the blog

Oct 13, 2022

Magniber Ransomware adopts Javascript, targeting home users with fake software updates

Read blog post

July 15, 2022

​Stealthy OpenDocument malware deployed against Latin American hotels

Read blog post

June 6, 2022

SVCReady: A new loader gets ready

Read blog post

Quarterly Threat Report

HP Wolf Security Threat Insights Report Q3 2022

This report reviews notable threats, malware trends and techniques identified by HP Wolf Security’s customer telemetry in calendar Q3 2022. Highlights include...

Read the report

View all reports

More HP Wolf perspectives

Out of Sight & Out of Mind

The workplace has evolved, ushering in the age of hybrid working. Digital and workplace transformation have both been accelerated, and work has forever changed...

Read the report 

Rebellions & Rejections

The global pandemic forced organizations to pivot rapidly from an office-based workforce model to one in which dynamic, hybrid working is the norm. This new way...

Read the report 

Industry Insights

IDC, HP: Holistic Endpoint Security Requires Built-in Hardware-based Defenses 

Analyst report where IDC talks about the need for hardware-based security and explains how HP helps fill that need.

Read the report

Quocirca

Quocirca's 2022 Print Security Landscape

Trends and opportunites for securing the hybrid workplace.

Read the report

Forrester Recommends Zero Trust Approach to Endpoint Security 

Forrester study demonstrating the value of a Zero Trust approach to endpoint security in reducing attack surface and improving productivity.

Read the report

Tag Cyber: Design of Secure PC Endpoints, An Introduction to HP Wolf Security

An introduction to HP Wolf Security designed for a modern, Zero Trust endpoint computing environment.

Read the report

See HP Wolf Security in
action

Take a tour of our world-class​ security solutions, guided by an HP Wolf Security specialist.

Request a demo

Disclaimers

The information contained herein is subject to change without notice.