Discover PerformanceHP Software's community for IT leaders // January 2014
Staying ahead of the cybercriminals
HP VP Art Gilliland explains why organizations must get on the same page about what assets to keep under heavy guard.Start your short list
Fighting cyber crime with preparation and personnel
Larry Ponemon discusses the nature of today’s sophisticated adversaries and the best practices of organizations that manage to keep the business impact low.Beat the black hats
The CIO’s 2014 cheat sheet
Experts on mobility, security, cloud, Big Data, and IT leadership tell us what should be top-of-mind in the coming year.Starting point
KPN Telecom trusts HP’s best-in-class security
Jaya Baloo, CISO, explains why KPN Telecom entrusts HP with the security of its customer data and regards HP as a “best-in-class” partner.Watch now
Most read articles
Diving into disruptive technology trends like cloud, mobile, and Big Data, HP’s CEO talks about moving not just IT, but the whole enterprise, into a new era.
Dig into strategic trends with our new Discover Performance Weekly video series, and go backstage at events like RSA.
Average time required to resolve a cyber crime in 2013 (compared with 24 days in 2012).1
Average annualized cost of cyber crime per organization in 2013 (compared with $8.9 million in 2012).1
Projected value of the cloud-based security services market in 2013 (rising to $3.1 billion in 2015).2
2"Gartner Press Release: Gartner Says Cloud-Based Security Services Market to Reach $2.1 Billion in 2013," Gartner, Inc., October 2013
Q: Why are malicious “insider attacks” so hard to detect and so expensive?
A: We find a lot of organizations don’t think about an inside-out type attack in the same way they think about an outside-in attack, but they could be the same thing. You could have an internal bad guy working with an external bad guy. That combination leads to a very sophisticated, stealthy, and successful attack. The most expensive attacks—the ones that lead to the theft of very, very valuable intellectual property such as a secret formula or defense design documents—often use that structure, where each party alone wouldn’t have the ability to get to the targeted information, so they work in collaboration.
—Larry Ponemon, chairman and founder of the Ponemon Institute, on the Discover Performance blog