Discover Performance

HP Software's community for IT leaders // June 2014
Subscribe

Business insight

3 mobile security best practices, learned the hard way

Outsourced mobile apps are a Trojan horse for vulnerabilities. HP Software narrowly headed off a disaster—and changed its processes.

Lessons learned

Expert Q&A

Addressing the security talent gap

HP Enterprise Security Products CTO Jacob West explains why your open security positions are likely to stay that way, and what needs to change (starting with your gender ratio).

Attract the best

Threat assessment

A post-Heartbleed roundup

When Heartbleed was revealed in April, HP Security Research dove right in. This blog post gathers all our experts' discussion of the heart-stopping security flaw.

Heart of the matter

CISO insight

Research: Threat intel and top ROI

Larry Ponemon - image

Researcher Larry Ponemon on key trends in security research, the rise of threat intelligence, and security tools that deliver the best ROI.

Watch now

x

IT leader assessment

This tool evaluates the correlation between IT attributes and business success and, based on how your answers compare with average scores, will advise you where to invest in IT.

It is based on data HP collected from 650 global companies about a range of IT characteristics (server capacities, approach to information management, security, BYOD, etc.) and how they correlate to revenue gain. This assessment will compare your answers to the average scores in that study.

There are 12 questions that will require an estimated 10 minutes of your time. You'll receive a summary of your rating upon completion.



Let's get started
x

Please select an answer.
x

Analysis:

Your answer:
Your score:
Average score:
Revenue leaders' score:


x

Please select an answer.


x

Results

Your score:
Average score:
Revenue leaders' score:


Get detailed results:

Subscribe

Popular tags

Most read articles

Discover Performance

Archive

Enterprise 20/20

Security 20/20

Preparing today for tomorrow’s threats.

Introduction to Enterprise 20/20

What will a successful enterprise look like in the future?

CIO 20/20

Challenges and opportunities for the CIO of the future.

Dev Center 20/20

How will we organize development centers for the apps that will power our enterprises?

Marketing 20/20

Welcome to a new reality of split-second decisions and marketing by the numbers.

IT Operations 20/20

How can you achieve the data center of the future?

Employee 20/20

What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.

Mobility 20/20

Looking toward the era when everyone — and everything — is connected.

Data Center 20/20

The innovation and revenue engine of the enterprise.

Read more

Events

Big Data changes everything

HP CEO Meg Whitman discusses how connected intelligence will drive IT operations, application development, IT security, marketing, compliance—and the bottom line. Register now.

HP Protect 2014

Connect with nearly 1,500 security pros to learn how to better disrupt or mitigate threats. Learn to think like a bad guy. (Washington, D.C., Sept. 8 – 11)

Closing the book on Heartbleed

The Heartbleed vulnerability set users and enterprises scrambling. How can we avoid or mitigate the next Heartbleed?

Discover Performance Weekly

HP Software’s Paul Muller hosts a weekly video digging into the hottest IT issues. Check out the latest episode.

One question

Q: What do recent breaches at major retailers tell us about the evolution of cyber crime?

A: While the equipment needed to read and write magnetic stripes was a barrier for credit card crime in the past, these resources are now more affordable and accessible …. Memory scraping has become the new trend, but there is no easy way to defend against this technique, as the magnetic stripe information is decrypted at some point in the process. This limitation with magnetic stripe technology and the history of cat-and-mouse between the credit card industry and the criminals tells us that it is time to adopt a new technology, such as EMV or “Chip & Pin.”

— Matt Oh, HP Senior Malware Researcher, on the HP Security Research blog

Security poll

HP Security Research blog

Tweets @ HPSecurity