Blog

28March

Best Practices to Prevent Data Breaches in 2016

In 2015 around 40 percent of data breaches were the result of external intrusions, while the remainder were caused by a lack of internal controls/employee actions, lost or stolen devices/documents, and social engineering/fraud. The good news is that the vast majority of security breaches can be prevented by implementing and enforcing basic security best practices
  • data breach, data breaches, data security, hackers
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
28March

Market Focus- Companies cautiously optimistic about cybersecurity

Optimism is good. But being overconfident about your ability to counter cyber attacks is dangerous. And that’s what many security professionals are doing according to new research by SC Magazine. Eighty percent of survey respondents believe the chances of being breached are 50-50 or less. But the Ponemon Institute 2015 Cost of Cyber Crime Study
  • cyber risk, cyber security, cybersecurity
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
28March

Your Enterprise Security Buyer’s Guide Checklist

Discover how to choose the right enterprise security solution to prepare for today’s threat landscape. This checklist will help you understand your environment and security needs better before taking action. Enterprise security is a complex problem, and you should perform specific tasks before you investigate a security solution: – Define the purpose of your security
  • cyber security, information security, IT security
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
28March

2016 State of Security Operations

Hacker attacks are increasing, and the cost to businesses is growing. Experts tell us it’s not if you’ll be breached, it’s when. So the effectiveness of your security operations determines how much damage you’ll suffer. Since 2008, Hewlett Packard Enterprise Security has performed 154 assessments of the maturity of security operations in 114 security operations
  • cyber security, IT security
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
28March

The 2016 Cyber Risk Report

Hackers are finding new vulnerabilities in your IT environment and developing new ways to exploit them. To fight back, you’ve got to know what they know and understand how they attack. Cyber Risk Report 2016 culminates a year-long research by HPE Security Research, our industry-leading research arm. It brings you the information you need to
  • cyber risk, cybersecurity
  • Posted by HPE  Posted on 28 Mar  0 Comments
  • Read More
24March

Bug bounties: Check the color of the hat

More companies see value in ethical hacking - but there's plenty of risk
  • black hats, bug bounty programs, ethical hacking, HPE Cyber Risk Report, white hats
  • Posted by Beth Stackpole  Posted on 24 Mar  0 Comments
  • Read More
21March

Can cybersecurity provide competitive advantage?

Smart business leaders are figuring out that cybersecurity is about more than simply preventing attacks.
  • cybersecurity, data breach, hacking, HPE Cyber Risk Report
  • Posted by Charles Cooper  Posted on 21 Mar  0 Comments
  • Read More