Skip to main content
Exploring what’s next in tech – Insights, information, and ideas for today’s IT and business leaders

The top 10 security stories of 2020

On Nov. 30 we celebrate Computer Security Day with a collection of the best Enterprise.nxt security stories.

Here at Hewlett Packard Enterprise and Enterprise.nxt, we know that security is a top concern to our readers. That's why we provide a stream of quality stories that not only identify potential security problems but also offer actionable advice to help you mitigate them. In recognition of Computer Security Day on Nov. 30, here is a recap of some of our stories from the past year.

Zero trust makes business secure by default

In a rush to digitally transform, enterprises are embracing mobile, smart devices, machine learning, and new, more agile methods of application development, deployment, and management. Never have companies faced so much technological change. A new philosophy of security makes no assumptions about the trustworthiness of networks and the devices on them.

DevSecOps and containers: How a cloud-native model places new demands on organizational security

More often than not, container projects start out small—as experiments on developers' laptops. One developer shares with another, and after a few months of tinkering, a team brings the packaged-up microservice into the organization's production environment. After a quick security check, it will be ready to deploy. That's when things derail.

A data fabric enables a comprehensive data strategy

For the modern enterprise, data is both the core asset and a big problem. The whole body of company data contains the sum of company knowledge of its products, its assets, its customers, and its people.

Touchless authentication for the post-COVID world

More people are looking for ways to avoid having to touch keypads, credit cards, door handles, and everything in between. As payments via contactless methods increase, so does the interest in more ways to conduct touchless authentication.

How to prepare for and mitigate DDoS attacks

It's painfully clear that distributed denial-of-service attacks aren't going away. DDoS attacks are getting easier to execute with more computers and devices, increased computing power, and better connectivity.

Application and data security start in the supply chain

Most advice on security relates to how you use the products you have. It presumes that the products come to you in a secure and uncompromised state. But that's not always the case. Not only is it possible for a supplier's products to be compromised before you receive them, but such supply chain compromises have happened.

Flood of transient containers challenges network visibility and security

Container-based microservices are increasingly the architecture of choice for enterprise applications. Services running in containers are highly interconnected and also connected with distributed backing data services. Networking, therefore, is a critical component in the container ecosystem. However, due to its dynamic and highly scalable nature, container architectures present considerable challenges to enterprise data center networks.

7 best practices for closing the IT security gap

The list of security best practices can be long, and those practices may be difficult to implement. We always have to prioritize, so which are the most important ones? The Ponemon Institute 2020 Global Study on Closing the IT Security Gap uncovered the seven best practices of high-performing organizations.

Is your approach to data protection more expensive than useful?

Data protection has always been a concern for IT groups, but with the massive influx of data from a multitude of sources, ensuring that the data remains accessible, available, and, most important, secure has become a more critical piece of the IT role. With downtime or data loss having extensive repercussions, it is clear that data is the lifeblood of an organization.

IT security at home: Hard but not impossible

When the COVID-19 quarantine hit in mid-March, it created an unprecedented situation in which the number of remote workers skyrocketed beyond anything anticipated. Experts say organizations that follow best practices are in the best position to handle work from home securely.

This article/content was written by the individual writer identified and does not necessarily reflect the view of Hewlett Packard Enterprise Company.