Discover PerformanceHP Software's community for IT leaders // June 2014
3 mobile security best practices, learned the hard way
Outsourced mobile apps are a Trojan horse for vulnerabilities. HP Software narrowly headed off a disaster—and changed its processes.Lessons learned
Addressing the security talent gap
HP Enterprise Security Products CTO Jacob West explains why your open security positions are likely to stay that way, and what needs to change (starting with your gender ratio).Attract the best
A post-Heartbleed roundup
When Heartbleed was revealed in April, HP Security Research dove right in. This blog post gathers all our experts' discussion of the heart-stopping security flaw.Heart of the matter
Research: Threat intel and top ROI
Researcher Larry Ponemon on key trends in security research, the rise of threat intelligence, and security tools that deliver the best ROI.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)
The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?
HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.
Q: What do recent breaches at major retailers tell us about the evolution of cyber crime?
A: While the equipment needed to read and write magnetic stripes was a barrier for credit card crime in the past, these resources are now more affordable and accessible …. Memory scraping has become the new trend, but there is no easy way to defend against this technique, as the magnetic stripe information is decrypted at some point in the process. This limitation with magnetic stripe technology and the history of cat-and-mouse between the credit card industry and the criminals tells us that it is time to adopt a new technology, such as EMV or “Chip & Pin.”
— Matt Oh, HP Senior Malware Researcher, on the HP Security Research blog