Home Business IT Security HP: 'Learn from cyber criminals'

The IT community needs to learn from cyber criminals, according to a senior HP technologist.

HP enterprise security services chief technologist Andrzej Kawalec (pictured above) thinks cyber criminals "have a competitive advantage" over the security community because they are more innovative, faster, more collaborative, more creative, and better funded.

"They understand the New Style of IT better than we do," he observed.

With 16 successful cybercrimes occurring per second with an annual value of US$100 billion, we face "a relentless and dynamic threat environment," he said, noting that one million new hackers - "an integrated army" - are expected by 2020.

"They're taking advantage of all the systems we've built," including software as a service.

Among the problems are people's vulnerability to phishing and other attacks ("there's no patch for people"), untrustworthy mobile apps ("nine out of ten mobile apps have significant security flaws" whether by design or carelessness), 80% of security budgets going on network defences (no longer a viable idea: "the cybercriminals are already inside"), and the way organisations are taking longer to respond to breaches once they have been detected (and that's after the average 243 days between penetration and detection).

We therefore need to understand the way the criminals work, learn from them, and work out how to disrupt them, Mr Kawalec suggested.

So HP has developed or acquired tools and technologies to address each step of the cybercrime cycle - research, infiltration, discovery, capture and exfiltration - and can see what is happening in close to real time.

"We are as relentless and dynamic as the cybercriminals," with 5000 security professionals. HP currently tracks more than 40,000 security events per second, and its TippingPoint operation (which runs a "not-for-profit bounty scheme" that pays 'white hat' security researchers for the vulnerabilities they uncover) has been responsible for bringing to light 70% of the known vulnerabilities in Microsoft products since 2006 and 50% of those in Adobe products.

After the vulnerabilities have been validated TippingPoint builds protections into its own products, informs the vendor concerned, and then shares the information with the rest of the industry.

Even banks and oil companies cannot attract and retain top security professionals the way HP can, he noted.

"You don't have to do it alone," he said, "we're closing the gap on the hackers."

Page 2: New security products from HP.

FREE HANDS-ON DATA ANALYTICS WORKSHOPS

Are you looking to yield real value from your big and small data?

Are you looking to use Hardoop? What about Visual Analytics and Visual Statistics to find lucrative opportunities, risks and to improve targeted marketing?

If these topics are of interest to you then you cannot afford to miss these free Australian and New Zealand SEPTEMBER workshops.

REGISTER YOUR INTEREST!

FREE NETWORKING SERVICES CASE STUDY

As one of the world’s largest social networking services, Facebook handles a lot of user information, and requires input from an astounding range of stakeholders 24 hours a day, 7 days a week — from both inside and outside the business.

Discover how Facebook was helped to connect remote employees, vendors, consultants, and partners to applications and web services quickly and reliably - without risking sensitive data.

GET CASE STUDY!

GET THE IT BUDGET YOU WANT

Explore your Network Treasure Trove to get the IT Budget you want

With Australian businesses projected to spend over $78.7 Billion why does it feel like you can never get the budget you need?.

In most cases your budget will get approved because the proposals are not only technically correct, but also provide good, credible evidence on how the spend aligns with key business objectives.

Did you know that your Network Monitoring tool can help you build a comprehensive business case without an MBA?

HERE ARE 8 TIPS TO GET THE IT BUDGET YOU WANT.

CLICK HERE!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences, a PhD in Industrial and Business Studies, and is a senior member of the Australian Computer Society.

Connect

 

 

 

 

Join the iTWire Community and be part of the latest news, invites to exclusive events, whitepapers and educational materials and oppertunities.
Why do I want to receive this daily update?
  • The latest features from iTWire
  • Free whitepaper downloads
  • Industry opportunities