Enterprise Services Blog
Get the latest thought leadership and information about the role of Enterprise Services in an increasingly interconnected world at HP Communities.

Get out of the water! Spielberg understands the CISO

spielberg ciso protect security smaller.jpg

Recently in the secret CTO headquarters, the chief technologists were discussing how it feels to be in the shoes of a chief information security office (CISO) when the call comes in about a major data breach. How does it feel to be the leader at that moment?


This made me think about the iconic 1975 movie, Jaws, especially the beach scene when Chief Brody, played by Roy Scheider, is sitting looking at a seemingly peaceful and typical seaside afternoon. As Spielberg toys with our expectations, there are a couple of frightening false alarms, and then the inevitable occurs.

5-Minute Strategy: Advancing the Battle Against Cyber Threats

Art Wong interview Katie linendoll discover compressed.jpgKnow it or not, all enterprises are affected, and generally outmanned, by the billion-dollar cyber crime ecosystem. On average, it takes 205 days for an enterprise to identify a security breach. Even worse, adversaries can infiltrate an organization for years without being detected.


HP Enterprise Security Services leader Art Wong explains how the enterprise should fight hackers and cyber criminals, and why the effort is an ongoing process. Watch now.

Are you up for the Security Challenge?

Secuirty Challenge Wall smaller2.pngYour company’s security comes down to three big issues: sophisticated threats, complex regulations, and the evolving needs of IT. Do you have the proper strategies, mind-set and tactics to fight oncoming hack attempts and cyber-attacks?


The Security Challenge awaiting you at HP Discover is a don’t-miss experience. Sure, you’re usually aware of your surroundings—any threats lurking out there—but once you enter the Security world at Discover, you’ll emerge with a completely different outlook. Are you ready for the Challenge?

Why Application Security should be architected, designed and built in from the start

CATA.jpg recently talked about cyber security with John Diamant, HP Secure Product Development Strategist and Distinguished Technologist. I learned two very important things:


  1.  Applications security is becoming increasingly important in the overall cyber security landscape and is a growing area of vulnerability.
  2. Security has been traditionally treated as something you can “test for” after the fact, but needs to be treated like quality, which is architected, designed and built right into the IT solution.


We also discussed 4 main types of risk and cost associated with application vulnerabilities. Read the full interview. 

Cybersecurity, Big Data, Public Cloud, SAP, Virtualization: Around Enterprise Services, Nov 4

roundabout.jpgBy PT Umphress, Enterprise Services WW Marketing


Here is a summary of the Enterprise Services blog topics for this past week:


  • Cybersecurity: Does It Take More Than Being Vigilant?
  • Planning for a big data world…
  • HP helps accelerate Detroit Media Partnership’s business performance through virtualization
  • Finance & Administration in a seamless, connected, context aware world
  • The Workday of the Future: 9 to 5 in the office RIP
  • Complexity - the paradox of doing everything right
  • Gartner event shores up hybrid delivery reality
  • More on HP public cloud service beta
  • What Makes It Tick? An Inside Look at HP Enterprise Cloud Services
  • Why most organizations risk a security breach from their imaging and printing environment
  • HP’s internal efforts at in memory processing
  • HP and SAP RDS CRM – Solutions Made Fast, Efficient and In the Cloud!
  • Mission Critical Services for SAP –Live Session at SAP Sapphire Madrid
  • Improve B2B Invoice Processing with Invoice Automation
  • In World Series of Technology, HP Enterprise Services' Michael Donovan Named Rookie of The Year
  • Saving the Life of a Client
Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.