Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

The day after tomorrow: Cyber crisis management at the speed of Twitter

Andrzej Kawalec, Chief Technology Officer, Enterprise Security Services, HP

 

When you’re managing a cyber-crisis, the first 48 hours are crucial. Not only can they dramatically affect your organization in the months and years ahead, but they can also have a direct impact on your own career as well.

 

approved bad guy-compressed.jpg

At HP Discover, join Andrzej Kawalec, Chief Technology Officer, Enterprise Security Services, as he explores the latest developments in cyber-security and crisis management. The valuable minutes you spend with him will be the difference between navigating the conversation in the boardroom while keeping your company’s name out of the newsroom.

 

Ssshhh! Don’t tell a soul, sign up for a Security Workshop and join the security club!

The first rule of the security club is, we don’t talk about the security club! Here’s an excellent opportunity to attend a workshop focusing on security. Sign up today to attend one of our Security Workshops to learn the rest of the security club rules – be ready to beat the hackers before they even know you can fight!

 

HP Discover in Barcelona - Sign up today to attend one of our Transformation Workshops - Security workshops and learn the latest on security trends and solutions.

How should CISOs approach cloud security?

HP_CloudStrike_hero_compressed for web.jpg

By Jeremy Ward, Global Security Consulting Services Offering Manager, Hewlett-Packard

 

According to an article in the latest issue of HP INFORM, an HP Enterprise Security Services eBook, CISOs need to consider a well-rounded approach when it comes to Cloud security.

 

Find out why and how HP can help in this short extract.

Security tip: Recognizing fake antivirus software

Enterprise connect video blog.pngChris Leach, Client Security Principal, Enterprise Security Services, Hewlett-Packard

 

Chances are you either have been victim or know someone who has been held hostage by a fake antivirus program. This fake program demands a ransom via your credit card to release your computer back to your control. Some of these programs are even accessing your camera and including a photograph of you—the user—as an additional scare tactic.

 

Here are some practical tips for you to use at home, with your friends, family, and clients that will help you address this growing type of malware.

Overcoming the Equation: Security = Friction

The growing presence of computers, sensors, and mobile devices require a new approach to security - one that's easy to use, but provides a sufficient level of assurance. We need to reduce the friction of secure transactions.

 

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us
Featured


About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.