Discover PerformanceHP Software's community for IT leaders // May 2013
How to make security intelligence actionable
Jacob West, head of the new HP Security Research, discusses the need to share intelligence and act fast.Act wisely
Pit big data against big threats
You’ve got more data than ever to track and protect—but you’ve also got more information to keep you abreast of risks. Are you mastering your data?Dig in
4 keys to delivering true IT value
Understanding IT’s core “value streams” lets you focus less on tasks, more on achieving excellence in strategic planning, design and operations—and security from beginning to end.Special delivery
Human figures on the security landscape
HP Security Research leader Jacob West discusses security for mobile apps, and why people and process are critical to any security initiative.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Join thousands of IT execs, engineers, and solution experts to explore IT trends, strategies, and best practices. (Barcelona,
HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.
Percentage of U.S. consumers who feel their online privacy is threatened and use a computer, tablet PC or smartphone for work activities.1
Percentage of applications found vulnerable to cross-site scripting.2
2"HP 2012 Cyber Risk Report," HP Enterprise Security, February 2013
Q: How do you stop security itself from becoming a weakness?
A: More than once I’ve discovered the source of a breach to be a “security device.” Or, just as bad, it turns out that a security device the organization counted on, which should have prevented the attack, was not kept up and simply missed something obvious. If you don’t have an upkeep strategy for each and every one of your security devices, you’re in trouble. At the very best you’ll end up with a false sense of security. At the worst your security widget may actually be the attacker’s way in.
—Rafal Los, principal, strategic security services, HP ESS, on his Wh1t3 Rabbit security blog