Discover PerformanceHP Software's community for IT leaders // January 2014
Staying ahead of the cybercriminals
HP VP Art Gilliland explains why organizations must get on the same page about what assets to keep under heavy guard.Start your short list
Fighting cyber crime with preparation and personnel
Larry Ponemon discusses the nature of today’s sophisticated adversaries and the best practices of organizations that manage to keep the business impact low.Beat the black hats
The CIO’s 2014 cheat sheet
Experts on mobility, security, cloud, Big Data, and IT leadership tell us what should be top-of-mind in the coming year.Starting point
KPN Telecom trusts HP’s best-in-class security
Jaya Baloo, CISO, explains why KPN Telecom entrusts HP with the security of its customer data and regards HP as a “best-in-class” partner.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Average time required to resolve a cyber crime in 2013 (compared with 24 days in 2012).1
Average annualized cost of cyber crime per organization in 2013 (compared with $8.9 million in 2012).1
Projected value of the cloud-based security services market in 2013 (rising to $3.1 billion in 2015).2
2"Gartner Press Release: Gartner Says Cloud-Based Security Services Market to Reach $2.1 Billion in 2013," Gartner, Inc., October 2013
Q: Why are malicious “insider attacks” so hard to detect and so expensive?
A: We find a lot of organizations don’t think about an inside-out type attack in the same way they think about an outside-in attack, but they could be the same thing. You could have an internal bad guy working with an external bad guy. That combination leads to a very sophisticated, stealthy, and successful attack. The most expensive attacks—the ones that lead to the theft of very, very valuable intellectual property such as a secret formula or defense design documents—often use that structure, where each party alone wouldn’t have the ability to get to the targeted information, so they work in collaboration.
—Larry Ponemon, chairman and founder of the Ponemon Institute, on the Discover Performance blog