Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Top 10 Security Threats, Risks and Challenges: Part 2

by Richard Archdeacon, Strategy & Technology


Welcome to part 2 of this two part blog post series providing a short guide to the most important threats, risks and challenges to business currently facing the enterprise CISO. In the first post I discussed Advanced Persistent Threats, Cyber Warfare Attacks, Hactivism, Cloud and Consumerisation & Mobile Working. Here are numbers 6 to 10 in the list.


6 Social Networking

The rise of Facebook, Twitter and other social networks are the social and technical phenomenon of the last five years. Deeply ingrained they pose security and logistical headaches for security people.

Top 10 Security Threats, Risks and Challenges: Part 1

by Richard Archdeacon, Strategy & Technology


This two part blog post series provides a short guide to the most important threats, risks and challenges to business currently facing the enterprise CISO. Here are the first 5:


1 Advanced Persistent Threats

Until recently the concept of the Advanced Persistent Threat was seen as largely theoretical. Now, security experts consider relentless and highly sophisticated cyber attacks launched by agencies acting on behalf of or within nation states as very real and highly dangerous to enterprises.

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.