Discover PerformanceHP Software's community for IT leaders // September 2014
Interactive assessment tool
Measure your cyber crime exposure
Security expert Larry Ponemon unveils a tool to estimate how much cyber attacks could cost your organization, and previews his 2014 cost of cyber crime report.Read more
Go where the enemy is: Cover your apps
The adversary is putting more effort into your applications. Here’s how you can do the same.Read more
Understanding Bitcoin and IT security
HP Security Research digs into the cryptocurrency and looks at how IT security is vital to its value.Read more
Start thinking like a bad guy
There’s no silver bullet to security. HP Enterprise Security VP Frank Mong talks about how to change your thinking on security to better counter your adversaries.Watch now
Most read articles
Preparing today for tomorrow’s threats.
Introduction to Enterprise 20/20
What will a successful enterprise look like in the future?
Challenges and opportunities for the CIO of the future.
Dev Center 20/20
How will we organize development centers for the apps that will power our enterprises?
Welcome to a new reality of split-second decisions and marketing by the numbers.
IT Operations 20/20
How can you achieve the data center of the future?
What the workforce of 2020 can expect from IT, and what IT can expect from the workforce.
Looking toward the era when everyone — and everything — is connected.
Data Center 20/20
The innovation and revenue engine of the enterprise.
Q: Is it all that hard to steal $60 million anymore?
A: Nowadays, [criminals can] get in and get out fast. A faceless crime. Stealth and speed are the weapons of the cybercriminal. We don’t have to evade a national manhunt. We are able to do this in seconds or milliseconds around the world at a click of a button. Cybercriminals are naturally a little bit nervous about physical danger. They don’t like the idea. However, there are still criminals in the world who are quite comfortable with physical danger and high risk. What we see is those things coming together. There’s been an amazing integration between traditional [criminals] and cybercriminals … when the combination comes together, the power that they can influence around the world is phenomenal.
—Andrzej Kawalec, Chief Technologist, HP Enterprise Security Services, at HP Discover Las Vegas 2014