- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- Fundamentals for building a robust cybersecurity s...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Fundamentals for building a robust cybersecurity strategy
Get ahead of ever-evolving cyber threats with a foundational security approach that addresses your entire IT environment.
- By guest blogger Anne Taylor, independent technology and business writer
Cyber threats are increasing in complexity and volume. Bad actors are escalating their attacks with sophisticated techniques. A recent article on CSO highlighted some of the emerging threats, including:
- A Russian hacking group called Midnight Blizzard, which uses Microsoft Teams to carry out phishing attacks
- Data poisoning, where hackers corrupt data being used to train machine- or deep-learning models
- AI-based threats, such as bad actors launching malware packages into generative AI environments used by software developers
It’s no wonder that 88% of IT security leaders believe their organizations are falling short in addressing cyber risks, according to Foundry’s 2023 Security Priorities study.
Most IT and security professionals already recognize that incidents are a matter of when, not if, and that they need a proactive strategy. But what should that approach include? How can you protect your organization against constantly evolving attacks when it’s challenging to keep pace with what’s being launched today?
There are three fundamentals that provide the basis for a robust cybersecurity strategy: education, trust, and a full-stack security approach.
Fundamental #1: Know the risks
It is eas to understand why cybersecurity and vulnerability alerts get missed. They come from dozens if not hundreds of security tools and applications. In addition to alert fatigue, the Foundry security study found that companies are struggling to address cyber risks due to:
- Difficulty convincing all or parts of their organization of risk severity
- Insufficient investment in budget, people, and technologies to address risks
- Challenges in finding, acquiring, or retaining the necessary security expertise
To be sure, these are tall hurdles. Yet, overcoming them is crucial. The global costs of cybercrime — including data destruction, fraud, theft of intellectual property, business disruption, reputational harm, restoration efforts, and more — are expected to reach $10.5 trillion by 2025, according to Cybersecurity Ventures[1].
If your organization is among the 88% falling short in addressing cyber risks, Moor Insights & Strategy[2] suggests starting with a cyber environment assessment. Ideally, that would be conducted by an objective third party that doesn’t have a stake in the results. It should give you a basis for a risk discussion with your executive team and provide a checklist of weaknesses and vulnerabilities to fix.
In terms of filling expertise gaps, there are several avenues to pursue, including working with managed services providers and retraining IT professionals who demonstrate a natural curiosity toward cybersecurity. An end-to-end stack with built-in cybersecurity functionality also goes a long way toward alleviating the burden on overstretched security teams.
Fundamental #2 - Trust is a critical ingredient
Zero trust (ZT) practices and technologies lay the foundation for baked-in security; 49% are using these technologies and another 32% are researching ZT solutions, services, and models, according to Foundry’s Security Priorities study.
That said, a great deal of focus so far has been placed on securing applications and networks — making sure the right people have access to the right resources. However, it’s also critical to extend trust throughout devices and computing platforms, including servers and cloud infrastructure.
Standards and operating frameworks can help you embed zero trust in your IT environment. For example, the National Institute of Standards and Technology Cybersecurity Framework, a collaboration between industry and government, offers guidelines, standards, and best practices toward protecting critical infrastructure.
Other ZT resources include the Cybersecurity and Infrastructure Security Agency Zero Trust Maturity Model, which can be used to guide toward identifying security gaps and measuring effectiveness. Another resource is the Department of Defense Zero Trust Strategy, which provides advice toward implementing stringent security practices.
Moor Insights also recommends conducting an audit of your infrastructure. Attacks are increasingly targeting firmware, such as the remote installation of malware that can launch at device boot up. A June 2023 report from Moor recommends:
- Understanding which generation of servers are deployed in your organization and what levels of protection they provide
- Assessing whether the CPUs in your servers are vulnerable to side-channel attacks
- Determining if your server provider has built-in protections at the hardware and firmware levels
Finally, it’s critical to trust your vendors. They should instill confidence that they too are taking a proactive approach to security.
Fundamental #3 - Full-stack security, from silicon to software
HPE ProLiant Gen11 servers have been built for end-to-end proactive security. The latest generation helps defend your organization against existing cyber threats, while also providing constant security advancements for ongoing protection — from silicon to software, from factory to cloud, and from generation to generation.
In addition, HPE ProLiant servers have security protections built in throughout the layers for all attack types.
Full-stack security is supported by innovations from within the HPE trusted partner ecosystem. For example, Intel is a Tier 1 HPE partner and together the two companies share “an uncompromising focus to deliver infrastructure that can be trusted, as well as features that provide easier security management,” said Humphreys.
HPE and Intel take a fundamental approach to security. HPE ProLiant next-gen servers are built with 4th Gen and 5th Gen Intel® Xeon® Scalable processors and security features such as Intel® Control-Flow Enforcement Technology (Intel® CET).
Intel CET is designed to mitigate an attack that Mike Ferron-Jones, Product Manager, Data Center Security Technologies at Intel calls an “evil genius.” In a recent interview, he said the capability is “designed to look for existing bits of server code that it can execute in a particular order to achieve a malicious outcome, such as opening a command prompt. Intel CET disrupts those control mechanisms to prevent [compromises] from taking effect so the software behaves as the developer intended.”
The bottom line
Education, trusted security, and a full-stack approach are must-have fundamentals for a robust and proactive security strategy that delivers confidence to the business and data protection.
Find out more by visiting HPE ProLiant
[1] Cybercrime To Cost the World $10.5 Trillion Annually By 2025 (cybersecurityventures.com)
[2] Moor Insights and Strategy: Zero Trust - Five Steps for Enterprise IT (hpe.com)
Meet Compute Experts guest blogger Anne Taylor
Anne is an independent technology and business writer with 20+ years of experience. She strategizes and creates content – including blogs, webinars, white papers, research surveys, and infographics – across a wide range of companies and industries. Her background is in both journalism and content marketing.
Compute Experts
Hewlett Packard Enterprise
twitter.com/hpe_compute
linkedin.com/showcase/hpe-servers-and-systems/
hpe.com/servers
- Back to Blog
- Newer Article
- Older Article
- PerryS on: Explore key updates and enhancements for HPE OneVi...
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- ComputeExperts on: Did you know that liquid cooling is currently avai...
- Jams_C_Servers on: If you’re not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYC™ 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
160 -
HPC & SUPERCOMPUTING
138 -
Mission Critical
88 -
SMB
169