
Internet Security Threat Report 2014

Corporate networks are under a constant state of siege - not just from threats but from the pressure of supporting the ever-growing number of clients, devices and platforms that have resulted from the BYOD phenomena. Network demands will only increase as we move to the "internet of things" adding sensors and instrumentation of all types to the list of security burdens.
As a result, many organizations are planning network refreshes to ensure bandwidth for current and future needs will be available. But new networking protocols and hardware can bring new attack surfaces for both internal and external threats, and organizations must consider new security measures, from intrusion prevention systems to next-generation firewalls to ensure network upgrades don't leave them at higher risk.
This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities.
Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped coming. This is why website security is so important.
This white paper explores six threats to your website and what you can do to prevent them - website malware, malvertising, search engine blacklisting, security warning and expired certificates, brand impersonisation (phishing) and customer security concerns.
With the escalating number and increasing sophistication of cyber attacks, perimeter defenses are no longer enough. Enterprises must ensure application vulnerabilities don’t open doors for hackers. Mainstay surveyed 12 organizations that implemented application vulnerability testing with HP Fortify.
Their findings: HP Fortify customers reduced application vulnerabilities from hundreds to tens, the average time to fix them from weeks to hours, and time-to-market delays due to vulnerabilities from 120 days per year to none. And companies who used HP Fortify on Demand-a cloud-based solution-saw results and achieved time to value faster. Read the report to learn how.
Turkey's Finansbank needed a way to spot potential fraud among millions of electronic transactions. But implementing a commercial fraud management application would take 18 months-far too long. Based on their experience using HP ArcSight Enterprise Security Manager (ESM) for IT security operations, they decided to adapt HP ArcSight ESM for fraud management.
Within six months Finansbank was able to use HP ArcSight ESM to authorize transactions in near real time. Using its flexible rules engine and advanced correlation, they reduced false positives by 90% and the time to resolve flagged transactions by 80%. Read the report to learn how.
As the incidence and cost of cyber crime have escalated, organizations have responded by establishing security operations centers (SOCs) to detect and counter cyber attack and to assure compliance with industry guidelines. But how capable are SOCs, and where is the greatest opportunity for improvement?
HP Security Intelligence and Operations Consulting has performed maturity assessments evaluating people, processes and technology in 69 SOCs. This report presents their findings on the measured maturity level of SOCs by industry. Read it to understand: Areas needing the most improvement; Lessons learned; and Recommendations on target maturity levels for enterprises and managed security service providers.