Discover PerformanceHP Software's community for IT leaders // July 2014
A simple plan for secure DevOps
IT’s push to break down the development and operations silos is an opportunity for security to add value, says InfoSec expert James Wickett.Read more
Where are all the security professionals?
Minnesota State University Professor Chris Veltsos talks about why 40 percent of security jobs are vacant in this episode of Discover Performance Weekly.Watch now
‘Trained intuition’: HP’s approach to security analyst training
It’s about a lot more than tools, says HP Enterprise Security’s director of solutions innovation, Chris Calvert. It’s about knowing how your adversary moves, and getting there first.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)
The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?
HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.
Q: How does a security team take the initiative with attackers?
A: It’s worth discussing the question: “What, exactly, does it mean to have the initiative?” If you are waiting on your adversary to do something, at which point you will respond, you do not have the initiative. If you are building static defenses to protect yourself and your key assets, you still do not have the initiative. To have the initiative, you must be actively creating the scenarios where you intend to draw-in your adversaries and demolish them. Once they make contact with your network, if they are responding to your tripwires and traps, or are being unknowingly mined for intelligence, then you have the initiative. This is an active defense.