Discover Performance

HP Software's community for IT leaders // April 2014
Subscribe

Security strategy

Rate your security, but don’t aim too high

A new report offers a new scale for measuring security maturity—and finds that it’s not necessarily best to be the best.

Middle road

CISO insight

HP customer TELUS protects customers with HP ArcSight

Hernan Barros, director of product management at security solutions provider TELUS, uses HP ArcSight to isolate threats before customers are hit.

Watch now

In depth

How to make the mobile era more secure

Bloomberg provides a perspective on mobile security. It’s not easy, but rethinking some assumptions will open new paths.

Safer moves

Security Video

Has enterprise IT lost the security war?

HP Enterprise Security CTO Jacob West talks risk management in Paul Muller's “Discover Performance Weekly” video series.

Fight on

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episodes.

Security index

56

Percentage of applications tested that exhibited weaknesses revealing information about the application, implementation, or user.1

46

Percentage of mobile iOS and Android applications that use encryption improperly.1

80.4

Percentage of applications that contain vulnerabilities exposed by incorrect configuration (only 15.9 percent of vulnerabilities were due to code quality).1

"HP Security Cyber Risk Report 2013," HP, February 2014

One question

Q: What’s the biggest shortcoming of the White House’s Cybersecurity Framework?

A: Put simply, there’s no teeth to the new standards, as compliance is completely voluntary. So why are security standards for critical pieces of infrastructure not mandatory? For one, the political gridlock that has affected most things has also impacted security efforts. […] But more so, it’s because the fear of governmental backdoors and spying has created a climate of fear inhospitable to any legislation that would require mandatory measures (or network access) for any industry. Corporations have fought back hard against any meaningful legislation. After Snowden, it’s hard to find fault with that. But for things whose security affects all of us, there has to be something better than “enlightened self-interest.” 

— Mark Painter, HP Security Evangelist, on the HP Security Products blog 

HP Security Research blog

Tweets @ HPSecurity