Discover PerformanceHP Software's community for IT leaders // May 2013
How to make security intelligence actionable
Jacob West, head of the new HP Security Research, discusses the need to share intelligence and act fast.Act wisely
Pit big data against big threats
You’ve got more data than ever to track and protect—but you’ve also got more information to keep you abreast of risks. Are you mastering your data?Dig in
4 keys to delivering true IT value
Understanding IT’s core “value streams” lets you focus less on tasks, more on achieving excellence in strategic planning, design and operations—and security from beginning to end.Special delivery
Human figures on the security landscape
HP Security Research leader Jacob West discusses security for mobile apps, and why people and process are critical to any security initiative.Watch now
Most read articles
Percentage of U.S. consumers who feel their online privacy is threatened and use a computer, tablet PC or smartphone for work activities.1
Percentage of applications found vulnerable to cross-site scripting.2
2"HP 2012 Cyber Risk Report," HP Enterprise Security, February 2013
Q: How do you stop security itself from becoming a weakness?
A: More than once I’ve discovered the source of a breach to be a “security device.” Or, just as bad, it turns out that a security device the organization counted on, which should have prevented the attack, was not kept up and simply missed something obvious. If you don’t have an upkeep strategy for each and every one of your security devices, you’re in trouble. At the very best you’ll end up with a false sense of security. At the worst your security widget may actually be the attacker’s way in.
—Rafal Los, principal, strategic security services, HP ESS, on his Wh1t3 Rabbit security blog