• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

HP sheds light on enterprise giants' security know-how

Company outlines best practices for secure infrastructure

Digital padlock
  • Shaun Nichols
  • Shaun Nichols
  • @shaundnichols
  • 18 December 2012
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

HP has released a study which examines the security policies of the largest brands in the IT and finance space and issues a set of best practices for all firms.

Dubbed the Building Security In Maturity Model (BSIMM), the report outlines a series of recommendations for how companies structure and practice their secure software development programmes.

This year's study examined some 51 firms to determine the most pervasive and effective techniques for building secure applications. Participants included Microsoft, Google, Bank of America, Salesforce and Visa.

Gary McGraw, chief technology officer at consulting firm Cigital and co-author of the report, said that despite their wide range of products and specialisations, the study found that the best practices were able translate across the software, finance and even mobile markets.

"The software activity undertaken by banks are exact the same as the practices undertaken by Google and Microsoft," McGraw told V3.

"Our theory was they would not be the same but it turns out they are more alike than different."

That uniformity has enabled researchers to develop a set of 12 recommendations for companies on how security is planned and deployed in the development cycle.

The best practices range from simple items such as network security and firewall deployments to strategic initiatives including training staff on basic security and best practices.

Other initiatives on the list include the identification of where security "gateway" protections can be placed in applications and how application architectures can impact the security of software.

The researchers also advised companies to look outside of their own walls, maintaining intelligence on attack trends and new threats as well as constantly test applications and services for new vulnerabilities.

"Many firms conduct this with external penetration testing," said Jacob West, chief technology officer for HP Fortify Products.

"This can be a big motivator if you are an organisation that does not understand it has a problem yet, because generally these reports come back with very critical issues."

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Developer
  • Strategy
  • HP
  • Microsoft
  • Adobe
  • Google

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017