By Jeremy Ward, Security Consulting Offering Manager
These days can any business honestly say with absolute confidence that it hasn’t had a security breach? Whether it’s been a major incident, involving serious data losses and prosecution by a data protection regulator, or a much more minor event; security breaches are now a part of business life.
By Jeffrey Lewis, Senior Global Marketing Manager, Enterprise Security Services
As we all know, technology has changed the way we work and communicate. In fact, as I’m writing this post, I am sitting in a coffee shop enjoying a warm mocha on a cold day in Texas.
Looking around the shop, I see a host of potential issues that illustrate some of our challenges.
More and more, cloud-based solutions are becoming a standard approach to your computing needs. Eventually companies will use the cloud as they do an electricity supply, with similar service levels (availability, security of supply, etc.) and acceptance of use. Indeed, anyone looking to obtain venture capital will find it difficult if cloud computing is not part of their solution.
By Simon Arnell, Security Analytics Service Director
The consumerization of IT has come a long way since that first discussion, emerging as one of the most significant trends to affect IT in the past 10 years. It’s no longer a question of if enterprises will choose consumerization, it’s a question of how CIOs will manage and secure IT consumerization and Bring Your Own Device (BYOD) as part of their overall business strategy.
HP’s Security Services Development Lead, Dr Jeremy Ward, presented a webinar last week on the topic of risk management. Providing invaluable insight into managing your business information risk, he discussed how this can help reconcile IT and business and approach security more efficiently.