Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Big data, security, and regulation in health care: A Q&A with Theresa Payton

Former White House CIO and security expert Theresa Payton, who leads IT security consultancy Fortalice Solutions, discusses some of the data privacy issues affecting health care. Here are some of her thoughts, as featured in the latest edition of HP INFORM.A Q&A with Theresa Payton blog.jpg 


Become smarter: Improve intelligence and manage your threat environment in 6 key steps

By Andrzej Kawalec, Chief Technology Officer, Enterprise Security Services, HP


Become smarter Improve intelligence blog.jpgToday, organizations can keep pace with top security megatrends by “becoming smarter about managing their own environment,” says Andrzej Kawalec, Chief Technology Officer, HP Enterprise Security Services.
 Read this short extract from his article in the latest interactive e-magazine HP INFORM to learn how to mitigate possible threats in a challenging setting.

The Bank Brigade: Why joint forces can protect against organized crime

Joining Forces Blog.jpgBy Andreas Wuchner, Chief Technologist, Enterprise Security Services, HP 


Faced with sophisticated cyber-threats from organized gangs, “Financial institutions need to be better at sharing threat intelligence,” says Andreas Wuchner, Chief Technologist, Enterprise Security Services, HP. Read this extract from his article in the latest interactive e-magazine HP INFORM for more insight on how threat exchange technology can help. 

Afraid of that 3:00 a.m. call? Then attend HP Protect to learn how to fight back

Jeff Misustin, Senior Global Marketing Manager, Enterprise Security Services, HP


Worried about receiving that 3:00 a.m. call announcing a new data breach? Staying awake at night? “Eating” advanced threats for breakfast, lunch, and dinner? Then attend HP Protect at National Harbor, MD, to learn how HP can help you defend your enterprise.

approved bad guy-compressed.jpg


In addition to our sessions on the show-floor theater, you’ll be able to experience the Security Challenge to gauge your readiness to stay one step ahead of the cyber-criminals. You’ll also have the opportunity to discuss your specific issues with our chief technologists—the best minds in the security industry—when you attend the sessions listed below.

If neon swans are different from black swans—how so? [Video]

By Andrzej Kawalec, Chief Technology Officer, Enterprise Security Services, Hewlett-Packard


Traveling back to the secret HP technology headquarters the other day, I got
stuck in airport security, so began toNeon Swan no text.png muse on the statistical modeling that our friends in the financial world use, and their occasional (ahem) ability to get it wrong. When they do, risk managers often talk about
black swans. They’re rare events of large magnitude that are virtually impossible to predict and very hard to respond to. A neon swan is different.

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.