The evolving threat landscape
How can you protect against an ever evolving attacker?
Keeping your office computing systems secure is a constantly moving target. In this video, HP's Head of Security Lab Simon Shiu and some real-world business IT users explain what kind of threats they are looking out for now and in the future. In particular, cybercrime is now an economy that can generate huge amounts of money, making the incentives for criminals to keep developing their tactics very considerable. Protection starts with ensuring systems are fully patched, but also includes keeping an eye on new legal provisions, in particular the EU's General Data Protection Regulation (GDPR), which aims to give control of personal data back to citizens and increases the fines for not doing so.
In the same way that new business ideas can become hits almost overnight for example the rapid onslaught of new social media and chat applications innovative threats can enjoy similarly speedy success. A very sophisticated piece of malware that proves successful can spawn lots of derivatives that multiply the danger very quickly. Although the original code might have taken considerable expense and expertise to develop, once this has a proven track record, it will easily be copied and customised. This is why HP focuses strongly on researching new threats, so that these can be combated with new security strategies as soon as they are encountered on corporate networks.
Find out how HP can protect your business against the evolving threat landscape.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
The hidden cost of MFT vulnerabilitiesIndustry Insights The channel can solve the fundamental fragility in how organizations handle their most sensitive data transfers
-
What businesses need to know about data sovereigntyWithout a firm strategy for data sovereignty, businesses put their data and reputations at risk
-
Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malwareNews Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned.
-
Amazon confirms employee data compromised amid 2023 MOVEit breach claims – but the hacker behind the leak says a host of other big tech names are also implicatedNews Millions of records stolen during the 2023 MOVEit data breach have been leaked
-
Nearly 70 software vendors sign up to CISA’s cyber resilience programNews Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US
-
PyPI attack: Targeting of repository 'shows no sign of stopping'News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
-
Capita's handling of cyber attack shows companies still fail at breach reportingAnalysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
-
Malware being pushed to businesses by search engines remains a pervasive threatNews High-profile malvertising campaigns in recent months have surged
-
There's only one way to avoid credential stuffing attacksOpinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
-
Five things to consider before choosing an MFA solutionIn-depth Because we all should move on from using “password” as a password
