Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Taking back the enterprise: “This is not your house.”

Not your house.jpgImagine now that the place you know as home, has been taken for granted and ultimately, violated all in an instant. Today, that seems to be the most recent case as cybercrime continues to be one of the top issues for enterprises globally. With the new partnership between HP and FireEye, scare away the bad guys with advanced threat services to help defend your enterprise. 

Government CIO Priorities to Enhance US Cybersecurity

The current atmosphere of porous government networks and unprotected information is demanding attention from government leaders and CIOs.

Why MSSP is becoming an important trend for enterprises

By: Jeffrey Lewis, Senior Worldwide Marketing Manager, Enterprise Security Services, Hewlett-Packard


Why MSSP is becoming an important trend for enterprises.jpgWith today’s ever-growing cyber environment, enterprises seem to have had no other choice but to reach out for a lending hand to help protect their security programs. In this article, discover just exactly why enterprises are turning to Managed Security Service Providers (MSSPs) to achieve value based on a 2014 Frost & Sullivan survey


Facing risk and defending against cyber breaches: An operational model

By Andreas Wuchner, @wuchi1, Chief Technologist, Security Innovation, Enterprise Security Services, HP


Changes to your company’s business model and underlying IT functions are driving the need for a clearer, better approach to information security and cyber risk. The demand for greater agility will be enabled by disruptive technologies such as cloud and mobility. In turn, this will lead to changes in the way your organization operates and which services are delivered from internal groups versus external service providers.


bad guy at screen - compressed.pngOften crucial business information will be held with a third-party provider, outside your company’s direct control. This introduces a new set of risks that you will need to manage.


To ensure your organization is prepared to face and handle the situation appropriately, a business-led security governance and management structure is required—to plan the appropriate defense strategies, and manage and prevent cyber breaches.


See my viewpoint paper, Security and Risk Governance: An Operational Model, for a full discussion of an operational model, organizational structures, and governance requirements.



Making sense of security metrics to build up a community of purpose

By Richard Archdeacon, Head of Security Strategy, Enterprise Security Services, HP


Making sense of security metrics blog.jpgWith today’s cyber-environment, enterprises need to make better security decisions. In this extract from an article in the latest HP INFORM, Richard Archdeacon, Chief Technologist, Information Security Strategy, HP looks beyond the IT department as protectors of data across the business. 

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.