Discover PerformanceHP Software's community for IT leaders // June 2012
Keep SaaS secure from the start
When you're not sure of your SaaS providers' risk management, be sure of your own.Take action
Evolving threats: Changing attack vectors, new infrastructures
The HP DVLabs Cyber Security Risks Report details new threats and the rise of "hacktivism."Get the report
The future of IT: No borders
HP Software CTO Mark Potts scouts the mobile, cloud-driven, highly mobile future.The future is now
RSA report: Security in a cash crunch
Hugh Njemanze, CTO and VP of worldwide R&D at HP Enterprise Security, talks about budget constraints, the value of multilayer security and more.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)
The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?
HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.
Percentage of reported security vulnerabilities in 2011 classified as high-severity (CVSS 8-10).1
Percentage of reported vulnerabilities to the IT enterprise that were web-app centric.1
Percentage who said privileged access was "determined by well-defined policies that are controlled by business or application owners."2
Q: How do you secure IT in a DevOps/NoOps world?
A: Leverage cloud computing environments and pre-defined, pre-secured "template" ("cloud mapped") PaaS environments where the developer is presented with a pre-configured virtual system every time, which has been set up for minimal risk and exposure through the build process and the security team's involvement.
— Rafal Los, HP Chief Security Evangelist, on his security blog, "Follow the White Rabbit"