HP Software's community for IT leaders
The struggle for secure apps
Enterprise security authority Gary McGraw charts the growth of app security and why, even in the mobile/cloud age, developers don’t bake it in from the start.
How to close the security skills gap
IT security guru Gary McGraw says bosses should insist that new developers know a thing or two about security—and then invest in teaching them even more.
Is security intelligence wasted on your organization?
HP security strategist Rafal Los counts off the five reasons security intelligence may not do you any good—so you can reach the stage where it will.
Care and feeding of Gen Y
Senior IT consultant Tammy Hughes offers a user’s manual for managing the next generation of IT worker: the millennials.
Globally, the average cost of a data breach per compromised record in 2013, up from $130 in 2012.1
Total number of records containing sensitive personal information involved in security breaches in the United States in 3,763 data breaches since January 2005.2
Average cost incurred by large North American companies in the wake of a cyber-attack ($616,000 is the average cost for large European companies).3
Q: How can security be a value-add rather than a constraint?
A: If we think of security as not something special but instead having more in common with other parts of IT and how they add value, our perspectives can shift. … Security techniques recognize new patterns of behavior—good, bad, or indifferent. What can the business do with that knowledge? Security approaches try to identify where people are coming from, where they are going, what they are doing while they are interacting with the business; what other parts of the business are interested in this sort of metadata? As I’ve mentioned to others (particularly around disaster recovery and cyber-attack avoidance), it is not usually our lack of preparedness that we need to worry about, it is our lack of imagination.
—Charlie Bess, HP Fellow and Cloud Advisor, on the Enterprise CIO Forum
Discover Performance ebooks
Download eBook (PDF-file, 300dpi, 3.7MB)
Download eBook (PDF-file, 300dpi, 9.5MB)
Download eBook (PDF-file, 300dpi, 2.45MB)
Mastering mobile security
HP Security CTO Jacob West describes the 5 key questions for protecting mobile apps in our new free ebook. Register/Sign in.
Take our quick, free assessment to see how you stack up.
Connect with your peers in our IT Strategy & Performance group on LinkedIn.
Sign up to get the best of the Discover Performance community delivered via email.
Read where the cloud is headed, and more, with our collaborative ebook project.
Get articles, demos, discussions, and downloads for and by software practitioners.
Most read articles