Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Massive Security Breach Response Shows it’s Good to be Prepared

76 percent of CEOs uncomfortable with breach response with gray.PNGLast week, we witnessed one of the largest data breaches to date which impacted nearly 40 million customers in the US.

 

This breach is yet just another example of what is happening on a daily basis. Breach disclosure is a tricky business, and it’s critical to ensure that partners, constituents and investors maintain confidence and trust in an organization in this type of event. Andrzej Kawalec, Chief Technology Officer, HP Enterprise Security Services, shares tips and highlights for an effective breach response program to prepare your enterprise.

How do cyber criminals steal $60 million in just 60 seconds?

Email-2-642x301.jpgThe digitalization of our lives has radically changed the way we live and work. But it has also changed the way criminals perpetrate crimes. Let’s take a page from their playbook and disrupt their business model, says Andrzej Kawalec, Chief Technology Officer, HP Enterprise Security Services, in the latest issue of HP INFORM.

Enterprise Forward: 3 things, 3 years – What communication sector executives need to know

bigdata.jpgEnterprise Forward

3 things, 3 years: What communication sector executives need to know

 

Evolution or revolution? Near-term advances in telecommunications will come with incredible opportunities for open source platforms, heterogeneous networks, and other innovative solutions. But enterprises will also be faced with new security challenges to support the new communications environment. In this Enterprise Forward article, Chief Technologist Jeff Edlund outlines three game-changing things to know about the next three years.  

Are new management strategies the ticket for securing mobile devices?

Security.jpgBy Ed Reynolds, HP Fellow, and Neil Passingham, Innovations Lead, HP Enterprise Security Services

 

Creating a successful data-device-application strategy depends upon each corporation’s ability to set the right priorities for what their enterprise needs, and then build in security features accordingly.

 

Kleptography: The dark side of cryptography

Email-2-642x301.jpgBy Ed Reynolds, HP Fellow, HP Enterprise Security Services

 

As more data moves to the cloud requiring encryption, cyber spies and thieves may well move with it—trying out new schemes to break into “secure” systems. With the consequences of a kleptography breach so high, IT executives should have the concept on their radar screens.

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us
Featured


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.