Articles by HPE

15September

Intelligent Security Operations: A How-To Guide

The following is a how-to guide for implementing an intelligent SOC. Whether you are starting from the beginning or looking to take the next step in maturity of your existing security operations, this paper can be used as a guide to confirm steps you have taken to date and plan for what comes next.
  • information security, IT security, security
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
15September

Threat Hunting: Open Season on the Adversary

Responses from 494 participants to the first SANS survey on threat hunting indicate that organizations are still figuring out exactly what a threat-hunting program should look like, how to attract the right skills and how to automate their processes.
  • insider threats, threat intelligence
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
15September

Disrupting the Business of Hacking

This paper provides a short history of the enterprise security defenses developed to disrupt cyber attacks.
  • cyber attacks, hacking
  • Posted by HPE  Posted on 15 Sep  0 Comments
  • Read More
28March

Best Practices to Prevent Data Breaches in 2016

In 2015 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices
  • data breach, data breaches, data security, hackers
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
28March

Market Focus- Companies cautiously optimistic about cybersecurity

Optimism is good. But being overconfident about your ability to counter cyber attacks is dangerous. And that’s what many security professionals are doing according to new research by SC Magazine. Eighty percent of survey respondents believe the chances of being breached are 50-50 or less. But the Ponemon Institute 2015 Cost of Cyber Crime Study
  • cyber risk, cyber security, cybersecurity
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More