Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

In apps we trust – or should we? Applications Security Sessions at HP Protect

Software is the new brand that defines the digital customer experience as characterized by Forrester VP, John McCarthy. In the brave new social world of mobile interactions, the omnipresent app becomes the preferred channel of access on the wearable device of our choice. It could even be a ring or a watch. As consumers, we begin to develop a sense of trust. How many times do you check yourself before clicking on a familiar app? “In Apps We Trust,” sort of becomes an implied mantra. But should we trust apps? Just take a look at Adversaries R Us.

Innovating with the criminal mind to secure $60 million at HP Discover

 “How to steal $60 million in 60 seconds” is one of the Innovation Theater session in the Security track at HP Discover. This session, delivered by Andrzej Kawalec, Chief Technologist, HP Enterprise Security Services, is about understanding how cyber criminals plan attacks that realize returns like $60 million in 60 seconds. While this session takes us into the darkest corners of Adversaries R Us, it also provides an opportunity to learn and apply a new style of thinking. I don’t expect to walk out with $60 million after this session, but I do feel very secure obtaining approximately $60 million worth of knowledge by attending the various sessions in this track. Join me in my quest to obtain $60 million worth of knowledge.

Internet of Things (IoT) matters at HP Discover

“You ain't seen nothin' yet,” is the phrase that comes to mind when I take a look at the HP Discover sessions on Internet of Things (IoT). Big Data mattered at past HP Discover conferences, but IoT is going to take it to the next level as projected in multiple sessions at HP Discover. Discover Theater session DT3621 from HP Labs discusses how the appliances in our homes, and the environment around us, generate data that must be harnessed and mined across the fabric of connected devices. At the same time, I am presenting on the on the impact of IoT on IT in a different Discover Theater session – DT3503. While gearing up for this session, I am reminded of a recent Twitter Chat, coordinated by the Enterprise CIO Forum, where it was abundantly clear that IoT is bound to matter to CIOs. Here are some of the key reasons why. 

Protecting your enterprise against “Adversaries ‘R’ Us”

A federal indictment from the United States Attorney's Office charges five men with conspiring in a worldwide hacking and data breach scheme to steal more than 160 million credit card numbers (a scheme akin to a global enterprise) with a strategy to fraudulently get to the most valued asset — information. Legitimate enterprises must stay up-to-date on various concepts, techniques and tools required to proactively safeguard their enterprises against such schemes, which can be loosely labeled as “Adversaries ‘R’ Us.” The sessions at HP Protect 2013 offer a diverse array of topics to that end. Here are some of my picks in the context of this security breach — the largest such scheme ever prosecuted in the United States.

Fortify the dynamic enterprise with static code analysis tools

Security is what I had in mind when I started teaching my daughter driving recently. I explained all the steps that a good, secure driver must take before setting the vehicle in motion when it is static – at rest. While these are really simple steps to ensure, for example, that the mirrors are positioned properly and the turn signals are functioning, they are also powerful life-saving steps once the vehicle is in motion. Applications are like cars in many respects. Therefore, enterprises should take a similar approach before putting their applications in motion. It is much easier to take precautionary measures by scanning the source code for vulnerabilities – way before running the binary code. Simple techniques, such as visual inspection, have proven powerful in the past. Imagine having a tool to automate such techniques and execute them faster that runs parallel to software development. Well, you don’t have to imagine any longer!

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation