Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • PC Hardware

    HP Refocuses Its Security Efforts in Light of Sony Hack, Company Split

    Written by

    Sean Michael Kerner
    Published January 10, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The security landscape in 2015 is already shifting, as organizations big and small try to avoid ending up as a victim of a data breach like the one that took a toll on Sony Pictures. The impact of the Sony breach is being felt at Hewlett-Packard as the company aims to protect itself and its customers in a year that is set to bring great change.

      Although changes in the market are likely in the year ahead, Art Gilliland, senior vice president and general manager of Enterprise Security Products at HP, noted that many of the attacks in recent months have stayed consistent and the Sony attack is an example of issues that have been talked about for a while.

      One of those issues is the risk of co-operative attacks, where there is an adversarial entity that has an objective of breaching a specific organization.

      “What is different about the Sony attack is that it is the first time that we’ve seen what we believe to be nation-state sponsored cyber-damage,” Gilliland told eWEEK.

      As opposed to being just an attack to steal information, Gilliland believes real damage was done to Sony as an act of cyber-terrorism.

      The U.S Federal Bureau of Investigation confirmed on Dec. 19 that North Korea was behind the Sony attack. While the FBI has blamed North Korea, other security experts have alleged that one or more former Sony employees may have worked with the attackers.

      The risk of insider threats is another key trend that concerns Gilliland. In his view, historically there has been an over-reliance on system level monitoring that is focused on protecting servers, desktops and laptops. With the system level monitoring approach, the goal is to prevent the protected systems from being infiltrated.

      “Sony is just one of many that prove that method of protection isn’t working, partly because of the insider problem,” Gilliland said.

      The reason this is such a problem is that there are users who have broad permissions to access data to do their jobs. Those users can do good work with their access—or they can do bad things.

      “The change that is going to occur is that we need to be a lot more information- and identity-centric in the way that we think about security going forward,” Gilliland said.

      HP Refocuses Its Security Efforts in Light of Sony Hack, Company Split

      The reality of the modern world is that there is reason to worry about security exploitation. However, there are things that can be done to reduce the risk, Gilliland said. It’s not about trying to stop breaches, he added, but rather about how quickly an organization can identify a breach so that the amount of damage can be limited and contained.

      Best Practices

      A good approach, according to Gilliland, is to have capabilities that can potentially disrupt processes used by attackers. He noted that much of the security spending today goes into technologies to block attacks.

      “If an organization just focuses on the silver bullet to block attacks, it’s inevitable that an attacker will get in,” Gilliland said. “The attackers will find the crack in the armor to get in.”

      He added that the ability to detect a breach and to know what to do once the breach has been detected are key skills that need to be in place as part of a mature security practice in 2015.

      Sony as a Security Business Driver

      One other impact that the Sony Pictures security incident has had is that it has once again put focus on the need for robust security, which is ultimately a good thing for HP and others in the security business.

      “Whenever there is any significant coverage of any breach, the interest in what we do is much higher,” Gilliland said. “There are lots of conversations that we have where the Sony, Target or Home Depot breaches are the topic of the discussion, and a lot of what comes out of the discussions is the question about what organizations need to do or change.”

      Another driver for security funding in 2015 will likely be the need for compliance with the PCI DSS (Payment Card Industry Data Security Standard) 3.0 specification that went into effect on Jan. 1, 2015. Companies are getting funding to meet the compliance requirements, but he said funding to just meet compliance can be a double-edged sword. The positive side is that organizations get funding for security; the downside is that some organizations may think that by achieving security compliance, their security is good enough. The reality is that it’s not enough and, in the increasingly complex threat landscape, security challenges are always growing.

      HP Enterprise

      In addition to the online threats that are impacting HP’s customers, there is another big change on the horizon for HP—the pending split of HP into two separate companies, one known as HP Inc. and the other as HP Enterprise. Gilliland and HP’s security division will become part of the new HP Enterprise company.

      “From a security perspective, it will give us more flexibility and the ability to invest differently in the things we do,” Gilliland said. “I think the focus it will give us on the enterprise customer base will be great for our customers and great for our shareholders.”

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.