Enterprise Security Trends Blog | HP Blogs
Keep up with the latest cyber, consumerisation, collaboration and cloud enterprise security trends from the team of HP information security professionals.

Are your applications securely holding the fort in your enterprise?

By E.G. Nadhan, HP Distinguished Technologist

 

Application Security.pngAdversaries are always on the prowl to penetrate the perimeters of the enterprise through the demilitarized zones, the intranet, the servers, the operating systems, the applications and finally, the data. Their overall goal is to gain access to the underlying data, which has even more value and context when accessed through the applications layer. Once the applications security is compromised, there are really no more layers of protection—since it opens up unfettered access to the data. Therefore, the applications layer has to hold the fort in your enterprise and be on guard should the outer perimeters be penetrated. 

You will face a security breach, are you prepared for the burden of proof?

Are you aware of your legal obligations as an enterprise if you suffer a security breach? “You almost have to be a global lawyer now, if you’re running security, that’s how complex it’s getting” explains Richard Archdeacon, Head of Security Strategy, HP Enterprise Security.

 

Security attacks are becoming Harder, Better, Faster, Stronger

There is no denying it - the volume, financial impact and sophistication of cyber-attacks and data breaches continue to increase. You might say that cyber criminals, hacktivists and cyber terrorists are getting Harder, Better, Faster, Stronger - to quote Daft Punk.

 

HP-Security_Infographic-solution_final_MG_01.jpg

 

Your Network is Full of Fish: How do You Ensure Compliance?

by Jeffrey Lewis, Product Marketing Manager, Enterprise Security Services

 

Not that anyone is nearly as interested in this stuff as I am, but I will be presenting a webinar on Monday around the need for better alignment of supplier compliance and enterprise compliance requirements. With nearly half of reported breach incidents coming at the hands of trusted suppliers, the need for better visibility and management of regulatory compliance is critical to secure enterprise information.

 

Full of Fish Thumb.jpg

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us


About the Author(s)
  • Manage cyber engineering & architecture team developing security services, security reference architectures, big data security, mobility, cloud, cyber situational awareness and security operation center solutions. Responsible for developing innovative cyber solutions across public sector accounts. Collaborates with HP Labs, HP CTO Organization, product groups and third-party vendors to leverage innovative technologies to deliver the next generation of cybersecurity solutions.
  • A business first, senior executive, with over 20 years of hands on experience in defending banks, governments and corporations against cyberwarfare. My career in security started when I was employed to crack a secure system, which had locked down the boot process, whitelisting of applications and encrypted disks. I linked TeamOffice (an ICL email and collaboration system) with Microsoft Word to send an email which allowed me to do anything the person reading the email could do and send the results back to me, all without there knowledge. Having proved this vulnerability, I worked with Peter Simpson to create Defuse, a tool that blocked inappropriate actions. This successfully blocked Winword Concept, the first known malicous code in the wild. From these begginings I have investigated all aspects of security to provide an holistic approach to security as a business enabler and currently advising organisations on the suitability of the cloud to their needs.
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation