Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Board level security concerns need proactive risk management

Corporate America says data security is now the main concern in the boardroom when it comes to legal considerations, says Antony Savvas in this ComputerworldUK article, titled US boardrooms wake up to data security. This position is based on a survey of 11,000 public company directors and 2000 general counsels who rank data security as their top corporate fear. "We would better get security right," says HP Security Strategist Mary Ann Mezzapelle in her keynote at the recently held Open Group Conference at Newport Beach, CA. Mezzapelle asserts that proactive risk management is the approach that most effectively combats the rising concerns across various dimensions of security. But how proactive can enterprises be?

Are your frameworks secure enough to combat criminal minds?

Enterprises view the adoption of standardized security frameworks as a panacea, addressing the challenges posed by our adversaries in the world of security. But are these security frameworks adequate? Do they inherently combat innovative criminal minds, which are constantly at work planning the next wave of attacks? Art Gilliland, Senior Vice President, and General Manager, HP Software Enterprise Security Products, says these frameworks are not only inadequate, but also set a low bar for enterprises, giving the enterprise a false sense of security. This message comes across loud and clear in Gilliland’s preview of his session on "Criminal Education: Lessons from the Criminals and their Methods" at the 2013 RSA Conference.

The current and future state of security at the 2013 RSA Conference

The annual RSA Conference brings together a wide array of perspectives from industry leaders in security. As such, it functions as a bellwether for all things security. Like other conferences, the keynote abstracts characterize the major themes in the conference providing, us valuable insight into the current and future state of security.

From the Desk of Big Data – Feels good to be secure

Hello Enterprise IT.  This is Data.

 

Remember when I introduced myself? I asked you to realize the big picture. Then I introduced my new master. I also alerted you to changes that may be needed to your job. Today I want to warn you that I am easily prone to falling prey to hackers on the prowl who misuse me in innovative ways. And remind you that I look to you – Enterprise IT – to protect me like you would protect your most valuable asset.

Information Security begins at home with your employees

Is your business protected against information security risks? HP expert Ken Larson points out five key information security management objectives for enterprises. One of these objectives – accessibility –stands out for me. In today's world of bringing your own devices, an ecosystem has been created that raises concerns about the security of the data exchanged in the process. Accessibility is a concern both from the standpoint of retrieval as well as dispatch of information. The right consumers must have the authorization to access the information and the information must be sent to the right consumers. This gets magnified when you consider the myriad possibilities with employees working out of their home office in addition to using their BYODs. Therefore, Information Security begins at home with your employee. Let us see why.

Search
Follow Us


About the Author(s)
Labels