Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Is the future of Information Security bleak? HP Inform discusses...

The new edition of HP Inform, from HP Enterprise Security Services is now online and focuses on the future of information security - or perhaps more accurately, if we don’t improve what we are doing now the future may well be bleak. Given that the current level of cyber threats and industrial production of malware, it might be argued that we are already losing the war against cyber.

future of infosec.jpg

 

But we should not give up. As the articles in HP Inform show there is original thought and willingness out there to radically rethink policies and strategies if we know where to look. Those intellectual and technical pioneers should hopefully serve as an inspiration and a spirit of optimism.

 

One young pioneer is Mohammed Zumla. Considered a rising star in security, his journey has taken him to Qatar Petroleum, the world’s third largest oil company. Inform quizzed him on the challenges of being at the top of the security function at a strategically important business. It’s a pleasure to see such a young person being given such a responsible position in global information security. We all know the importance of Middle East oil to global development and as cyber attacks increasingly target critical infrastructures, his role couldn’t be more important.

 

Zumla is a graduate of the world-renowned Information Security faculty at the University of London and the same institution contributes to our piece on how we can bridge the skills gap and encourage more young people into the profession. After all, if we don’t have people to utilize new skills and technology then we don’t stand any chance at all of defeating cyber threats, let alone containing them.

 

HP is of course fully committed to continuing its research into future security technologies and delivering its unrivalled thought leadership as you will discoverthroughout the content of HP Inform.

 

We welcome your feedback on HP Inform and its contents through our social media channels. To join the conversation with fellow readers, our contributors and editors, please use #hpinform on Twitter, Facebook and LinkedIn.

Comments
managed security services(anon) | ‎08-08-2013 05:34 AM

Nice article about Global Information Security . thanks for sharing with us .

   

multani(anon) | ‎09-03-2013 01:12 PM

i learn so many <a href="http://ciscotrainingchd.blogspot.in">things</a> from this blog.keep updating.thank you so much.

deepalicbitss(anon) | ‎09-18-2013 11:12 PM

Thanx for this <a href="http://ciscotrainingchd.blogspot.in/">informative</a> post.Your post helps me in
future.Keep updating stuffs.

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author
About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.


Follow Us